Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pm7g-w2cf-q238 | pac4j-jwt: JwtAuthenticator Authentication Bypass via JWE-Wrapped PlainJWT |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 05 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Mar 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pac4j
Pac4j pac4j |
|
| CPEs | cpe:2.3:a:pac4j:pac4j:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pac4j
Pac4j pac4j |
Wed, 04 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators. | |
| Title | pac4j-jwt JwtAuthenticator Authentication Bypass | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-11T15:00:54.781Z
Reserved: 2026-03-03T16:42:01.012Z
Link: CVE-2026-29000
Updated: 2026-03-05T16:21:48.858Z
Status : Awaiting Analysis
Published: 2026-03-04T22:16:18.783
Modified: 2026-03-10T20:16:37.840
Link: CVE-2026-29000
No data.
OpenCVE Enrichment
Updated: 2026-03-05T09:05:41Z
Github GHSA