Cyber Posture

CVE-2026-32714

CriticalPublic PoC

Published: 31 March 2026

Published
31 March 2026
Modified
03 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32714 is a critical-severity SQL Injection (CWE-89) vulnerability in Scitokens Scitokens Library. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validating and sanitizing user-supplied inputs such as issuer and key_id before use in SQL queries, directly preventing SQL injection exploitation in the KeyCache class.

prevent

Mandates timely identification, testing, and installation of software patches, such as upgrading SciTokens to version 1.9.6 to remediate the SQL injection flaw.

detect

Requires vulnerability scanning to identify and report the SQL injection vulnerability in SciTokens deployments for subsequent remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Why these techniques?

SQL injection enables remote unauthenticated exploitation of exposed apps using the library (T1190) and direct access to cached keys/credentials in the SQLite DB (T1212).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to construct SQL queries with user-supplied data (such as issuer and…

more

key_id). This allowed an attacker to execute arbitrary SQL commands against the local SQLite database. This issue has been patched in version 1.9.6.

Deeper analysisAI

CVE-2026-32714 is a SQL injection vulnerability (CWE-89) in the KeyCache class of the SciTokens Python library, a reference implementation for generating and using SciTokens prior to version 1.9.6. The flaw arises from using Python's str.format() method to construct SQL queries with untrusted user-supplied inputs, such as issuer and key_id values, against a local SQLite database. This issue earned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its critical severity due to high impacts on confidentiality, integrity, and availability.

The vulnerability can be exploited remotely by unauthenticated attackers with network access and no user interaction required. By crafting malicious issuer or key_id inputs, attackers can inject and execute arbitrary SQL commands on the local SQLite database used by KeyCache, potentially allowing full read, modification, or deletion of cached key data.

The vulnerability has been patched in SciTokens version 1.9.6, as detailed in the project's GitHub security advisory (GHSA-rh5m-2482-966c), release notes, and the fixing commit (3dba108853f2f4a6c0f2325c03779bf083c41cf2). Security practitioners should upgrade to version 1.9.6 or later and review deployments using earlier versions of the library for exposure.

Details

CWE(s)

Affected Products

scitokens
scitokens library
≤ 1.9.6

CVEs Like This One

CVE-2026-32727Same product: Scitokens Scitokens Library
CVE-2026-32716Same product: Scitokens Scitokens Library
CVE-2026-25773Shared CWE-89
CVE-2025-20620Shared CWE-89
CVE-2026-32725Same vendor: Scitokens
CVE-2026-32726Same vendor: Scitokens
CVE-2019-25539Shared CWE-89
CVE-2015-20121Shared CWE-89
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89

References