In python-jose 3.3.0 (specifically jwe.decrypt), a vulnerability allows an attacker to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | python-jose: python-jose: Denial-of-Service via malicious JSON Web Encryption (JWE) token decompression | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 18 Dec 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Python-jose Project
Python-jose Project python-jose |
|
| Vendors & Products |
Python-jose Project
Python-jose Project python-jose |
Wed, 17 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-409 | |
| Metrics |
cvssV3_1
|
Wed, 17 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In python-jose 3.3.0 (specifically jwe.decrypt), a vulnerability allows an attacker to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-17T16:09:53.251Z
Reserved: 2024-03-19T00:00:00.000Z
Link: CVE-2024-29370
No data.
Status : Awaiting Analysis
Published: 2025-12-17T16:16:04.457
Modified: 2025-12-18T15:07:42.550
Link: CVE-2024-29370
OpenCVE Enrichment
Updated: 2025-12-18T09:57:29Z