Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:pypi/jwcrypto@1.5.7
purl pkg:pypi/jwcrypto@1.5.7
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-9rtx-w9ry-rkcj JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to 1.5.7, an unauthenticated attacker can exhaust server memory by sending crafted JWE tokens with ZIP compression. The existing patch for CVE-2024-28102 limits input token size to 250KB but does not validate the decompressed output size. An unauthenticated attacker can cause memory exhaustion on memory-constrained systems. A token under the 250KB input limit can decompress to approximately 100MB. This vulnerability is fixed in 1.5.7. CVE-2026-39373
GHSA-fjrm-76x2-c4q4

Date Actor Action Vulnerability Source VulnerableCode Version
2026-05-09T22:26:39.427397+00:00 GitLab Importer Fixing VCID-9rtx-w9ry-rkcj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/jwcrypto/CVE-2026-39373.yml 38.6.0