Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m344-f55w-2m6j | Authlib: Fail-Open Cryptographic Verification in OIDC Hash Binding |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a library-level vulnerability was identified in the Authlib Python library concerning the validation of OpenID Connect (OIDC) ID Tokens. Specifically, the internal hash verification logic (_verify_hash) responsible for validating the at_hash (Access Token Hash) and c_hash (Authorization Code Hash) claims exhibits a fail-open behavior when encountering an unsupported or unknown cryptographic algorithm. This flaw allows an attacker to bypass mandatory integrity protections by supplying a forged ID Token with a deliberately unrecognized alg header parameter. The library intercepts the unsupported state and silently returns True (validation passed), inherently violating fundamental cryptographic design principles and direct OIDC specifications. This issue has been patched in version 1.6.9. | |
| Title | Authlib: Fail-Open Cryptographic Verification in OIDC Hash Binding | |
| Weaknesses | CWE-354 CWE-573 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-16T18:14:42.149Z
Reserved: 2026-02-27T20:57:47.708Z
Link: CVE-2026-28498
Updated: 2026-03-16T18:14:33.935Z
Status : Received
Published: 2026-03-16T18:16:07.717
Modified: 2026-03-16T18:16:07.717
Link: CVE-2026-28498
No data.
OpenCVE Enrichment
No data.
Github GHSA