Plattform
python
Komponente
scitokens
Behoben in
1.9.7
1.9.6
CVE-2026-32714 describes a critical SQL Injection vulnerability discovered in the scitokens Python library. This flaw allows attackers to inject malicious SQL code into database queries, potentially leading to unauthorized data access or modification. The vulnerability affects versions of scitokens up to and including 1.8.1. A fix is available in version 1.9.6.
The SQL Injection vulnerability in scitokens allows an attacker to directly manipulate database queries. By injecting malicious SQL code through the issuer and key_id parameters, an attacker can bypass authentication mechanisms, read sensitive data stored in the SQLite database (such as user credentials, API keys, or configuration information), modify existing data, or even execute arbitrary commands on the underlying system if the database user has sufficient privileges. The impact is particularly severe because the vulnerability resides within a core component responsible for key management, potentially compromising the entire application's security posture. This vulnerability shares similarities with other SQL Injection exploits where user input is directly incorporated into SQL queries without proper sanitization.
CVE-2026-32714 was publicly disclosed on 2026-03-31. The vulnerability is considered high probability due to the simplicity of exploitation and the availability of a public proof-of-concept. There are no current indications of active exploitation campaigns targeting this vulnerability, but its critical severity warrants immediate attention. The vulnerability has not been added to the CISA KEV catalog as of this writing.
Applications that rely on the scitokens library for authentication or authorization, particularly those using SQLite as their database backend, are at risk. Systems with older, unpatched versions of scitokens are especially vulnerable. Development environments and testing systems using scitokens should also be prioritized for patching.
• python / library:
import os
import sqlite3
def check_scitokens_version():
try:
import scitokens
version = scitokens.__version__
if version <= '1.8.1':
print(f"scitokens version is vulnerable: {version}")
else:
print(f"scitokens version is patched: {version}")
except ImportError:
print("scitokens is not installed.")
check_scitokens_version()• python / file: Examine src/scitokens/utils/keycache.py for instances of str.format() used with user-supplied data in SQL queries.
• generic web: Monitor application logs for unusual SQL errors or database activity that might indicate an attempted SQL Injection attack.
disclosure
poc
patch
Exploit-Status
EPSS
0.03% (10% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-32714 is to immediately upgrade scitokens to version 1.9.6 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing temporary workarounds. These may include input validation and sanitization of the issuer and keyid parameters before they are used in SQL queries. While not a complete solution, this can reduce the attack surface. Additionally, restrict database user privileges to the minimum necessary for the application to function. Monitor database logs for suspicious SQL queries that may indicate an attempted exploitation. After upgrading, confirm the fix by attempting to inject a simple SQL statement (e.g., ' OR '1'='1) into the issuer or keyid parameters and verifying that it does not result in unauthorized data access.
Aktualisieren Sie die SciTokens-Bibliothek auf Version 1.9.6 oder höher. Dies behebt die (SQL Injection)-Schwachstelle, indem str.format() verwendet wird, um SQL-Abfragen mit benutzerdefinierten Daten zu erstellen.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-32714 is a critical SQL Injection vulnerability in the scitokens Python library, allowing attackers to execute arbitrary SQL commands against the local SQLite database.
You are affected if you are using scitokens versions 1.8.1 or earlier. Upgrade to version 1.9.6 or later to resolve the vulnerability.
Upgrade to version 1.9.6 or later of the scitokens library. As a temporary workaround, implement input validation and sanitization for the issuer and key_id parameters.
While active exploitation is not confirmed, the vulnerability is considered highly exploitable and a public proof-of-concept exists, increasing the likelihood of exploitation.
Refer to the scitokens project's official security advisories and release notes for details: [https://github.com/scitokens/scitokens/releases](https://github.com/scitokens/scitokens/releases)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.