Cyber Posture

CVE-2026-27932

HighPublic PoC

Published: 03 March 2026

Published
03 March 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0005 14.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27932 is a high-severity Allocation of Resources Without Limits or Throttling (CWE-770) vulnerability in Hsiaoming Joserfc. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-770

This control implements explicit throttling on session allocation, addressing the weakness of allocating resources without limits.

addresses: CWE-770

Plan testing exercises resource allocation limits and throttling during simulated failures, directly addressing weaknesses that allow unbounded resource use.

addresses: CWE-770

Contingency plan updates ensure recovery strategies address unbounded resource allocation, making it harder for attackers to exploit lack of throttling to cause prolonged outages.

addresses: CWE-770

Provides continuity when unbounded resource allocation at the primary site leads to exhaustion and downtime.

addresses: CWE-770

Alternate services allow operations to continue when primary allocation of resources lacks limits or throttling.

addresses: CWE-770

Explicit planning of security-related actions requires defining limits, windows, and resource allocations, making allocation without throttling far less likely.

addresses: CWE-770

Measures of performance include tracking allocation behavior and throttling effectiveness, reducing the window for resource exhaustion attacks.

addresses: CWE-770

Imposes an inactivity-based limit on network resource allocation, throttling the number of concurrently held connections.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Vulnerability enables remote unauthenticated exploitation of public-facing apps (T1190) via crafted JWE input that triggers algorithmic complexity leading to application resource exhaustion/DoS (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In 1.6.2 and earlier, a resource exhaustion vulnerability in joserfc allows an unauthenticated attacker to cause a Denial of Service (DoS) via…

more

CPU exhaustion. When the library decrypts a JSON Web Encryption (JWE) token using Password-Based Encryption (PBES2) algorithms, it reads the p2c (PBES2 Count) parameter directly from the token's protected header. This parameter defines the number of iterations for the PBKDF2 key derivation function. Because joserfc does not validate or bound this value, an attacker can specify an extremely large iteration count (e.g., 2^31 - 1), forcing the server to expend massive CPU resources processing a single token. This vulnerability exists at the JWA layer and impacts all high-level JWE and JWT decryption interfaces if PBES2 algorithms are allowed by the application's policy.

Deeper analysisAI

CVE-2026-27932 is a resource exhaustion vulnerability in the joserfc Python library, versions 1.6.2 and earlier. The flaw arises during decryption of JSON Web Encryption (JWE) tokens using Password-Based Encryption (PBES2) algorithms, where the library reads the p2c (PBES2 Count) parameter directly from the token's protected header without validation or bounding. An attacker can specify an extremely large iteration count, such as 2^31 - 1, forcing excessive CPU consumption in the PBKDF2 key derivation function and causing denial of service (DoS). This issue resides at the JWA layer and affects all high-level JWE and JWT decryption interfaces if PBES2 algorithms are allowed by the application's policy. It is rated 7.5 on CVSS v3.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and maps to CWE-770 (Allocation of Resources Without Limits or Throttling).

An unauthenticated attacker with network access can exploit this vulnerability remotely with low complexity and no user interaction or privileges required. By crafting and submitting a malicious JWE token with a high p2c value, the attacker triggers massive CPU resource exhaustion on the target server during a single token processing attempt, leading to DoS.

Mitigation details are provided in the joserfc security advisory at https://github.com/authlib/joserfc/security/advisories/GHSA-w5r5-m38g-f9f9 and a fix commit at https://github.com/authlib/joserfc/commit/696a9611ab982c45ee2190ed79ca8e1d8e09398f. Security practitioners should upgrade to a patched version of joserfc and review application policies to restrict or disable PBES2 algorithms where feasible.

Details

CWE(s)

Affected Products

hsiaoming
joserfc
≤ 1.6.2

CVEs Like This One

CVE-2026-20103Shared CWE-770
CVE-2025-1059Shared CWE-770
CVE-2026-1848Shared CWE-770
CVE-2026-29168Shared CWE-770
CVE-2026-33258Shared CWE-770
CVE-2026-32280Shared CWE-770
CVE-2026-7776Shared CWE-770
CVE-2024-57663Shared CWE-770
CVE-2026-26061Shared CWE-770
CVE-2025-24312Shared CWE-770

References