Vulnerability Details CVE-2026-39373
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to 1.5.7, an unauthenticated attacker can exhaust server memory by sending crafted JWE tokens with ZIP compression. The existing patch for CVE-2024-28102 limits input token size to 250KB but does not validate the decompressed output size. An unauthenticated attacker can cause memory exhaustion on memory-constrained systems. A token under the 250KB input limit can decompress to approximately 100MB. This vulnerability is fixed in 1.5.7.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.7%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2026-39373
-
cpe:2.3:a:latchset:jwcrypto:-
-
cpe:2.3:a:latchset:jwcrypto:0.1.0
-
cpe:2.3:a:latchset:jwcrypto:0.2.0
-
cpe:2.3:a:latchset:jwcrypto:0.2.1
-
cpe:2.3:a:latchset:jwcrypto:0.3.0
-
cpe:2.3:a:latchset:jwcrypto:0.3.1
-
cpe:2.3:a:latchset:jwcrypto:0.3.2
-
cpe:2.3:a:latchset:jwcrypto:0.4.0
-
cpe:2.3:a:latchset:jwcrypto:0.4.1
-
cpe:2.3:a:latchset:jwcrypto:0.4.2
-
cpe:2.3:a:latchset:jwcrypto:0.5.0
-
cpe:2.3:a:latchset:jwcrypto:0.6.0
-
cpe:2.3:a:latchset:jwcrypto:0.7.0
-
cpe:2.3:a:latchset:jwcrypto:0.8.0
-
cpe:2.3:a:latchset:jwcrypto:0.9.0
-
cpe:2.3:a:latchset:jwcrypto:0.9.1
-
cpe:2.3:a:latchset:jwcrypto:1.0.0
-
cpe:2.3:a:latchset:jwcrypto:1.1.0
-
cpe:2.3:a:latchset:jwcrypto:1.2.0
-
cpe:2.3:a:latchset:jwcrypto:1.3.0
-
cpe:2.3:a:latchset:jwcrypto:1.4.0
-
cpe:2.3:a:latchset:jwcrypto:1.4.1
-
cpe:2.3:a:latchset:jwcrypto:1.4.2
-
cpe:2.3:a:latchset:jwcrypto:1.5.0
-
cpe:2.3:a:latchset:jwcrypto:1.5.1
-
cpe:2.3:a:latchset:jwcrypto:1.5.2
-
cpe:2.3:a:latchset:jwcrypto:1.5.3
-
cpe:2.3:a:latchset:jwcrypto:1.5.4
-
cpe:2.3:a:latchset:jwcrypto:1.5.5
-
cpe:2.3:a:latchset:jwcrypto:1.5.6