Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-61152

EPSS 0.07% · P21
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-61152

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
python-jose thru 3.3.0 allows JWT tokens with 'alg=none' to be decoded and accepted without any cryptographic signature verification. A malicious actor can craft a forged token with arbitrary claims (e.g., is_admin=true) and bypass authentication checks, leading to privilege escalation or unauthorized access in applications that rely on python-jose for token validation. This issue is exploitable unless developers explicitly reject 'alg=none' tokens, which is not enforced by the library. NOTE: all parties agree that the issue is not relevant because it only occurs in a "verify_signature": False situation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
python-jose 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
python-jose是Michael Davis个人开发者的一个 Python 中的 JOSE 实现。 python-jose 3.3.0及之前版本存在安全漏洞,该漏洞源于未强制执行alg=none令牌拒绝,可能导致绕过身份验证检查,进而导致权限提升或未经授权的访问。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-61152

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-61152

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-10-10 · 20 CVEs total

CVE-2025-608808.3 HIGHWebkul Software Bagisto 安全漏洞
CVE-2025-608697.3 HIGHPublii CMS 安全漏洞
CVE-2025-77816.4 MEDIUMWP JobHunt <= 7.6 - Authenticated (Candidate+) Stored Cross-Site Scripting via ‘cs_job_tit
CVE-2025-73745.4 MEDIUMWP JobHunt <= 7.6 Authenticated (Custom+) Authorization Bypass
CVE-2025-115815.3 MEDIUMPowerJob OpenAPIController runJob authorization
CVE-2025-115805.3 MEDIUMPowerJob list authorization
CVE-2025-115704.6 MEDIUMDrupal Unified Twig Extensions 安全漏洞
CVE-2025-60308Code-Projects Simple Online Hotel Reservation System 安全漏洞
CVE-2025-55903Perfex CRM 安全漏洞
CVE-2025-61505e107 安全漏洞
CVE-2025-60306Code-Projects Simple Car Rental System 安全漏洞
CVE-2025-60269JeeWMS 安全漏洞
CVE-2025-60305SourceCodester Online Student Clearance System 安全漏洞
CVE-2025-60838MingSoft MCMS 安全漏洞
CVE-2025-60268JeeWMS 安全漏洞
CVE-2025-61319reNgine 安全漏洞
CVE-2025-60868Statamic Alt Redirect 安全漏洞
CVE-2025-60378RISE Ultimate Project Manager & CRM 安全漏洞
CVE-2025-60307Code-Projects Computer Laboratory System 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2025-61152

No comments yet


Leave a comment