CVE-2025-65015
November 18, 2025
joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In versions from 1.3.3 to before 1.3.5 and from 1.4.0 to before 1.4.2, the ExceededSizeError exception messages are embedded with non-decoded JWT token parts and may cause Python logging to record an arbitrarily large, forged JWT payload. In situations where a misconfigured — or entirely absent — production-grade web server sits in front of a Python web application, an attacker may be able to send arbitrarily large bearer tokens in the HTTP request headers. When this occurs, Python logging or diagnostic tools (e.g., Sentry) may end up processing extremely large log messages containing the full JWT header during the joserfc.jwt.decode() operation. The same behavior also appears when validating claims and signature payload sizes, as the library raises joserfc.errors.ExceededSizeError() with the full payload embedded in the exception message. Since the payload is already fully loaded into memory at this stage, the library cannot prevent or reject it. This issue has been patched in versions 1.3.5 and 1.4.2.
Affected Packages
Joserfc (CONDA):
Affected version(s) =1.4.0 <1.4.2Fix Suggestion:
Update to version 1.4.2joserfc (PYTHON):
Affected version(s) >=1.3.3 <1.3.5Fix Suggestion:
Update to version 1.3.5joserfc (PYTHON):
Affected version(s) >=1.4.0 <1.4.2Fix Suggestion:
Update to version 1.4.2https://github.com/authlib/joserfc.git (SCM_GIT):
Affected version(s) >=1.4.0 <1.4.2Fix Suggestion:
Update to version 1.4.2https://github.com/authlib/joserfc.git (SCM_GIT):
Affected version(s) >=1.3.3 <1.3.5Fix Suggestion:
Update to version 1.3.5Related Resources (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.2
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
HIGH
CVSS v3
Base Score:
8.6
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH
Weakness Type (CWE)
Allocation of Resources Without Limits or Throttling
EPSS
Base Score:
0.05