PT-2026-23074 · Pac4J-Jwt · Pac4J-Jwt

Amartya Jha

·

Published

2026-03-04

·

Updated

2026-03-05

·

CVE-2026-29000

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
Name of the Vulnerable Software and Affected Versions pac4j-jwt versions prior to 4.5.9 pac4j-jwt versions prior to 5.7.9 pac4j-jwt versions prior to 6.3.3
Description The software contains an authentication bypass issue in the
JwtAuthenticator
component when handling encrypted JWTs. An attacker with access to the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, effectively bypassing signature verification and gaining unauthorized access, including administrative privileges.
Recommendations Update pac4j-jwt to version 4.5.9 or later. Update pac4j-jwt to version 5.7.9 or later. Update pac4j-jwt to version 6.3.3 or later.

Exploit

Fix

Improper Verification of Cryptographic Signature

Weakness Enumeration

Related Identifiers

CVE-2026-29000

Affected Products

Pac4J-Jwt