Medium severity5.9NVD Advisory· Published Apr 3, 2026· Updated Apr 13, 2026
CVE-2026-34052
CVE-2026-34052
Description
LTI JupyterHub Authenticator is a JupyterHub authenticator for LTI. Prior to version 1.6.3, the LTI 1.1 validator stores OAuth nonces in a class-level dictionary that grows without bounds. Nonces are added before signature validation, so an attacker with knowledge of a valid consumer key can send repeated requests with unique nonces to gradually exhaust server memory, causing a denial of service. This issue has been patched in version 1.6.3.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
jupyterhub-ltiauthenticatorPyPI | < 1.6.3 | 1.6.3 |
Affected products
1- cpe:2.3:a:jupyter:lti_jupyterhub_authenticator:*:*:*:*:*:*:*:*Range: <1.6.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-8mxq-7xr7-2fxjghsaADVISORY
- github.com/jupyterhub/ltiauthenticator/security/advisories/GHSA-8mxq-7xr7-2fxjnvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-34052ghsaADVISORY
- github.com/jupyterhub/ltiauthenticator/releases/tag/1.6.3nvdProductWEB
News mentions
0No linked articles in our index yet.