Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-65015
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-18 Nov, 2025 | 23:15
Updated At-15 Jan, 2026 | 22:10

joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In versions from 1.3.3 to before 1.3.5 and from 1.4.0 to before 1.4.2, the ExceededSizeError exception messages are embedded with non-decoded JWT token parts and may cause Python logging to record an arbitrarily large, forged JWT payload. In situations where a misconfigured — or entirely absent — production-grade web server sits in front of a Python web application, an attacker may be able to send arbitrarily large bearer tokens in the HTTP request headers. When this occurs, Python logging or diagnostic tools (e.g., Sentry) may end up processing extremely large log messages containing the full JWT header during the joserfc.jwt.decode() operation. The same behavior also appears when validating claims and signature payload sizes, as the library raises joserfc.errors.ExceededSizeError() with the full payload embedded in the exception message. Since the payload is already fully loaded into memory at this stage, the library cannot prevent or reject it. This issue has been patched in versions 1.3.5 and 1.4.2.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.09.2CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 4.0
Base score: 9.2
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

hsiaoming
hsiaoming
>>joserfc>>Versions from 1.3.3(inclusive) to 1.3.5(exclusive)
cpe:2.3:a:hsiaoming:joserfc:*:*:*:*:*:python:*:*
hsiaoming
hsiaoming
>>joserfc>>Versions from 1.4.0(inclusive) to 1.4.2(exclusive)
cpe:2.3:a:hsiaoming:joserfc:*:*:*:*:*:python:*:*
Weaknesses
CWE IDTypeSource
CWE-770Secondarysecurity-advisories@github.com
CWE ID: CWE-770
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/authlib/joserfc/commit/63932f169d924caffafa761af2122b82059017f7security-advisories@github.com
Patch
https://github.com/authlib/joserfc/commit/673c8743fd0605b0e1de6452be6cba75f44e466bsecurity-advisories@github.com
Patch
https://github.com/authlib/joserfc/releases/tag/1.3.5security-advisories@github.com
Release Notes
https://github.com/authlib/joserfc/releases/tag/1.4.2security-advisories@github.com
Release Notes
https://github.com/authlib/joserfc/security/advisories/GHSA-frfh-8v73-gjg4security-advisories@github.com
Exploit
Vendor Advisory
https://github.com/authlib/joserfc/security/advisories/GHSA-frfh-8v73-gjg4134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Vendor Advisory
Hyperlink: https://github.com/authlib/joserfc/commit/63932f169d924caffafa761af2122b82059017f7
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/authlib/joserfc/commit/673c8743fd0605b0e1de6452be6cba75f44e466b
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/authlib/joserfc/releases/tag/1.3.5
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/authlib/joserfc/releases/tag/1.4.2
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/authlib/joserfc/security/advisories/GHSA-frfh-8v73-gjg4
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Hyperlink: https://github.com/authlib/joserfc/security/advisories/GHSA-frfh-8v73-gjg4
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Vendor Advisory
Change History
0Changes found

Details not found