ROOT-APP-PYPI-CVE-2026-32597

Source
https://root.io/security/ROOT-APP-PYPI-CVE-2026-32597
Import Source
https://api.root.io/external/osv/ROOT-APP-PYPI-CVE-2026-32597.json
JSON Data
https://api.test.osv.dev/v1/vulns/ROOT-APP-PYPI-CVE-2026-32597
Upstream
Published
2026-05-21T08:46:25Z
Modified
2026-05-21T12:30:08.728630620Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
CVE-2026-32597 in rootio-PyJWT - Patched by Root
Details

Root has patched CVE-2026-32597 in the rootio-PyJWT package for Root:PyPI. Multiple fixed versions available.

Database specific
{
    "distro_version": "",
    "severity": "HIGH",
    "distro": "pypi",
    "source": "Root"
}
References

Affected packages

Root:PyPI / rootio-PyJWT

Package

Name
rootio-PyJWT

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9.0+root.io.1
Fixed
2.4.0+root.io.1
Fixed
2.10.1+root.io.1
Fixed
2.4.0+root.io.2
Fixed
2.10.1+root.io.2
Fixed
2.9.0+root.io.2
Fixed
2.8.0+root.io.1

Database specific

source
"https://api.root.io/external/osv/ROOT-APP-PYPI-CVE-2026-32597.json"
root_patched
true
total_fixed_versions
7.0
all_fixed_versions
[
    "2.9.0+root.io.1",
    "2.4.0+root.io.1",
    "2.10.1+root.io.1",
    "2.4.0+root.io.2",
    "2.10.1+root.io.2",
    "2.9.0+root.io.2",
    "2.8.0+root.io.1"
]
root_patch_version
"root.io.1"
upstream_version
"2.8.0"