Vulnerability Description
LTI JupyterHub Authenticator is a JupyterHub authenticator for LTI. Prior to version 1.6.3, the LTI 1.1 validator stores OAuth nonces in a class-level dictionary that grows without bounds. Nonces are added before signature validation, so an attacker with knowledge of a valid consumer key can send repeated requests with unique nonces to gradually exhaust server memory, causing a denial of service. This issue has been patched in version 1.6.3.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jupyter | Lti Jupyterhub Authenticator | < 1.6.3 |
Related Weaknesses (CWE)
References
- https://github.com/jupyterhub/ltiauthenticator/releases/tag/1.6.3Product
- https://github.com/jupyterhub/ltiauthenticator/security/advisories/GHSA-8mxq-7xrVendor Advisory
FAQ
What is CVE-2026-34052?
CVE-2026-34052 is a vulnerability with a CVSS score of 5.9 (MEDIUM). LTI JupyterHub Authenticator is a JupyterHub authenticator for LTI. Prior to version 1.6.3, the LTI 1.1 validator stores OAuth nonces in a class-level dictionary that grows without bounds. Nonces are ...
How severe is CVE-2026-34052?
CVE-2026-34052 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34052?
Check the references section above for vendor advisories and patch information. Affected products include: Jupyter Lti Jupyterhub Authenticator.