Vulnerability Description
SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to construct SQL queries with user-supplied data (such as issuer and key_id). This allowed an attacker to execute arbitrary SQL commands against the local SQLite database. This issue has been patched in version 1.9.6.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Scitokens | Scitokens Library | < 1.9.6 |
Related Weaknesses (CWE)
References
- https://github.com/scitokens/scitokens/commit/3dba108853f2f4a6c0f2325c03779bf083Patch
- https://github.com/scitokens/scitokens/releases/tag/v1.9.6Release Notes
- https://github.com/scitokens/scitokens/security/advisories/GHSA-rh5m-2482-966cExploitVendor Advisory
- https://github.com/scitokens/scitokens/security/advisories/GHSA-rh5m-2482-966cExploitVendor Advisory
FAQ
What is CVE-2026-32714?
CVE-2026-32714 is a vulnerability with a CVSS score of 9.8 (CRITICAL). SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to co...
How severe is CVE-2026-32714?
CVE-2026-32714 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-32714?
Check the references section above for vendor advisories and patch information. Affected products include: Scitokens Scitokens Library.