FastAPI Api Key has a timing side-channel in verify_key that allows statistical key validity detection
Low severity
GitHub Reviewed
Published
Jan 21, 2026
in
Athroniaeth/fastapi-api-key
•
Updated Jan 22, 2026
Description
Published to the GitHub Advisory Database
Jan 21, 2026
Reviewed
Jan 21, 2026
Published by the National Vulnerability Database
Jan 21, 2026
Last updated
Jan 22, 2026
Impact
Timing side-channel vulnerability in verify_key(). The method applied a random delay only on verification failures, allowing an attacker to statistically distinguish valid from invalid API keys by measuring response latencies. With enough repeated requests, an adversary could infer whether a key_id corresponds to a valid key, potentially accelerating brute-force or enumeration attacks.
Affected: all users relying on verify_key() for API key authentication prior to the fix.
Patches
Yes. Users should upgrade to version 1.1.0 (or the version containing this fix). The patch applies a uniform random delay (min_delay to max_delay) to all responses regardless of outcome, eliminating the timing correlation.
Workarounds
References
References