-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - PyJWT-2.7.0-py3-none-any.whl
JSON Web Token implementation in Python
Library home page: https://files.pythonhosted.org/packages/c7/e8/01b2e35d81e618a8212e651e10c91660bdfda49c1d15ce66f4ca1ff43649/PyJWT-2.7.0-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt,/requirements.txt
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (PyJWT version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2025-45768 | 7.0 | PyJWT-2.7.0-py3-none-any.whl | Direct | N/A | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-45768
Vulnerable Library - PyJWT-2.7.0-py3-none-any.whl
JSON Web Token implementation in Python
Library home page: https://files.pythonhosted.org/packages/c7/e8/01b2e35d81e618a8212e651e10c91660bdfda49c1d15ce66f4ca1ff43649/PyJWT-2.7.0-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt,/requirements.txt
Dependency Hierarchy:
- ❌ PyJWT-2.7.0-py3-none-any.whl (Vulnerable Library)
Found in base branch: main
Vulnerability Details
pyjwt v2.10.1 was discovered to contain weak encryption.
Publish Date: 2025-07-31
URL: CVE-2025-45768
CVSS 3 Score Details (7.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: High