SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass when processing path-based scopes in tokens. The library normalizes the scope path from the token before authorization and collapses ".." path components instead of rejecting them. As a result, an attacker can use parent-directory traversal in the scope claim to broaden the effective authorization beyond the intended directory. This issue has been patched in version 1.4.1.
Metrics
Affected Vendors & Products
References
History
Mon, 13 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Scitokens scitokens Cpp Library
|
|
| CPEs | cpe:2.3:a:scitokens:scitokens_cpp_library:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Scitokens scitokens Cpp Library
|
Fri, 03 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Scitokens
Scitokens scitokens-cpp |
|
| Vendors & Products |
Scitokens
Scitokens scitokens-cpp |
Tue, 31 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass when processing path-based scopes in tokens. The library normalizes the scope path from the token before authorization and collapses ".." path components instead of rejecting them. As a result, an attacker can use parent-directory traversal in the scope claim to broaden the effective authorization beyond the intended directory. This issue has been patched in version 1.4.1. | |
| Title | SciTokens C++: Relative Path Traversal Vulnerability | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-31T17:01:46.776Z
Updated: 2026-04-03T16:14:20.163Z
Reserved: 2026-03-13T15:02:00.625Z
Link: CVE-2026-32725
Updated: 2026-04-03T16:14:14.903Z
Status : Analyzed
Published: 2026-03-31T18:16:50.837
Modified: 2026-04-13T17:16:08.350
Link: CVE-2026-32725
No data.