CVE-2026-29000 PUBLISHED

pac4j-jwt JwtAuthenticator Authentication Bypass

Assigner: VulnCheck
Reserved: 03.03.2026 Published: 04.03.2026 Updated: 04.03.2026

pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L
CVSS Score: 10

Product Status

Vendor pac4j
Product pac4j-jwt
Versions Default: unaffected
  • affected from 4.0 to 4.5.9 (excl.)
  • affected from 5.0 to 5.7.9 (excl.)
  • affected from 6.0 to 6.3.3 (excl.)

Credits

  • CodeAnt AI Security finder

References

Problem Types

  • CWE-347 Improper Verification of Cryptographic Signature CWE