Generated remediation guidance and an executive summary. No account required.
In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asymmetric key confusion attacks against users using the PKCS1 PEM encoded public keys, which would allow an attacker to craft JWTs from scratch.
Cite this page
CVE-2017-11424. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2017-11424
Use Pyjwt Project vendor hub and Pyjwt product page to widen CVE-2017-11424 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-32597, CVE-2022-29217 and CVE-2025-45768 for nearby disclosures in the same product family.