PT-2026-23074 · Pac4J-Jwt · Pac4J-Jwt
Amartya Jha
·
Published
2026-03-04
·
Updated
2026-03-16
·
CVE-2026-29000
CVSS v3.1
10
| Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L |
Name of the Vulnerable Software and Affected Versions
pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3
Description
The
JwtAuthenticator component in the pac4j-jwt library has a flaw in how it validates cryptographic signatures of JWTs. An attacker with access to the server's RSA public key can create a specially crafted JWT (specifically a JWE-wrapped PlainJWT) with arbitrary subject and role claims, bypassing the signature verification process. This allows the attacker to authenticate as any user, including administrators. The issue arises because the library incorrectly trusts JWTs without proper signature verification when processing encrypted JWTs.Recommendations
Upgrade to pac4j-jwt version 4.5.9 or later.
Upgrade to pac4j-jwt version 5.7.9 or later.
Upgrade to pac4j-jwt version 6.3.3 or later.
Exploit
Fix
Improper Verification of Cryptographic Signature
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Pac4J-Jwt