Cyber Posture

CVE-2026-32727

HighPublic PoC

Published: 31 March 2026

Published
31 March 2026
Modified
03 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0002 5.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32727 is a high-severity Path Traversal (CWE-22) vulnerability in Scitokens Scitokens Library. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly mitigates CVE-2026-32727 by requiring timely patching of the SciTokens library to version 1.9.7, eliminating the path traversal vulnerability in the Enforcer.

prevent

Access enforcement ensures mechanisms like the SciTokens Enforcer correctly restrict file access based on token scope claims without normalization flaws allowing directory escapes.

prevent

Information input validation checks token scope claims for path traversal sequences like ../ before passing to the Enforcer, reducing exploitation risk.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Network path traversal in SciTokens Enforcer (AV:N, PR:L) directly enables remote exploitation of a public-facing authorization component (T1190) and bypasses directory restrictions for unauthorized file access/modification, achieving effective privilege escalation (T1068).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.7, the Enforcer is vulnerable to a path traversal attack where an attacker can use dot-dot (..) in the scope claim of a token to escape the…

more

intended directory restriction. This occurs because the library normalizes both the authorized path (from the token) and the requested path (from the application) before comparing them using startswith. This issue has been patched in version 1.9.7.

Deeper analysisAI

CVE-2026-32727 is a path traversal vulnerability (CWE-22) in the Enforcer component of the SciTokens library, affecting versions prior to 1.9.7. SciTokens is a reference library for generating and using SciTokens. The flaw occurs because the Enforcer normalizes both the authorized path from the token's scope claim and the requested path from the application before comparing them using startswith, enabling attackers to use dot-dot (..) sequences in the scope claim to bypass intended directory restrictions.

The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), indicating exploitation over the network with low complexity, low privileges required, and no user interaction. An attacker who can obtain a token with low privileges—such as an authenticated user—can craft the scope claim to include path traversal payloads, escaping the restricted directory. This allows unauthorized access to or modification of files outside the intended scope, resulting in high confidentiality and integrity impacts.

The issue has been addressed in SciTokens version 1.9.7. Mitigation involves upgrading to this patched version. Official resources include the GitHub security advisory (GHSA-3x2w-63fp-3qvw), the patching commit (2d1cc9e42bc944fe0bbc429b85d166e7156d53f9), pull request #230, and release notes for v1.9.7.

Details

CWE(s)

Affected Products

scitokens
scitokens library
≤ 1.9.7

CVEs Like This One

CVE-2026-32716Same product: Scitokens Scitokens Library
CVE-2026-32714Same product: Scitokens Scitokens Library
CVE-2026-32725Same vendor: Scitokens
CVE-2026-32726Same vendor: Scitokens
CVE-2026-1311Shared CWE-22
CVE-2025-62630Shared CWE-22
CVE-2025-60786Shared CWE-22
CVE-2026-21227Shared CWE-22
CVE-2025-12422Shared CWE-22
CVE-2025-27590Shared CWE-22

References