๐Ÿ” CVE Alert

CVE-2026-28498

UNKNOWN 0.0

Authlib: Fail-Open Cryptographic Verification in OIDC Hash Binding

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a library-level vulnerability was identified in the Authlib Python library concerning the validation of OpenID Connect (OIDC) ID Tokens. Specifically, the internal hash verification logic (_verify_hash) responsible for validating the at_hash (Access Token Hash) and c_hash (Authorization Code Hash) claims exhibits a fail-open behavior when encountering an unsupported or unknown cryptographic algorithm. This flaw allows an attacker to bypass mandatory integrity protections by supplying a forged ID Token with a deliberately unrecognized alg header parameter. The library intercepts the unsupported state and silently returns True (validation passed), inherently violating fundamental cryptographic design principles and direct OIDC specifications. This issue has been patched in version 1.6.9.

CWE CWE-354 CWE-573
Vendor authlib
Product authlib
Published Mar 16, 2026
Last Updated Mar 16, 2026
Stay Ahead of the Next One

Get instant alerts for authlib authlib

Be the first to know when new unknown vulnerabilities affecting authlib authlib are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

authlib / authlib
< 1.6.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/authlib/authlib/security/advisories/GHSA-m344-f55w-2m6j github.com: https://github.com/authlib/authlib/commit/b9bb2b25bf8b7e01512d847a95c1749646eaa72b github.com: https://github.com/authlib/authlib/releases/tag/v1.6.9