Description
pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators.
Published: 2026-03-04
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Authentication Bypass via Forged JWTs
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is located in pac4j-jwt’s JwtAuthenticator component in versions prior to 4.5.9, 5.7.9, and 6.3.3. An attacker who has the server’s RSA public key can create a JSON Web Encryption (JWE) wrapped PlainJWT containing arbitrary subject and role claims. Because the token bypasses the signature verification step, the attacker can authenticate as any user, including administrators, thereby gaining unauthorized access to protected resources.

Affected Systems

The affected product is pac4j pac4j-jwt. Systems running any version of pac4j-jwt earlier than 4.5.9, 5.7.9, or 6.3.3 are impacted. No other products or vendors are listed as affected.

Risk and Exploitability

The CVSS base score of 9.3 marks this flaw as critical. The EPSS score of < 1% indicates a very low but non-zero probability that exploit code for this vulnerability is circulating in the wild, and it is not currently listed in the CISA KEV catalog. Exploitation requires remote access to the application and possession of the RSA public key, which an attacker can obtain if it is improperly exposed. Given the high potential impact and the fact that the malicious token can be crafted and sent over any network connection, administrators should treat this as an urgent patching issue.

Generated by OpenCVE AI on April 16, 2026 at 13:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade pac4j-jwt to version 4.5.9 or later (or 5.7.9 or 6.3.3) to eliminate the authentication bypass.
  • Ensure that the RSA public key used for JWT verification is not exposed publicly; restrict access to the key material and rotate keys if compromised.
  • If an immediate upgrade is not feasible, implement a network-level filter or application firewall rule that blocks or rejects JWE-wrapped PlainJWT tokens without proper signature validation, and verify that your application enforces signature checks for all incoming tokens.

Generated by OpenCVE AI on April 16, 2026 at 13:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pm7g-w2cf-q238 pac4j-jwt: JwtAuthenticator Authentication Bypass via JWE-Wrapped PlainJWT
History

Tue, 10 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L'}

cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L'}

cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Thu, 05 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Pac4j
Pac4j pac4j
CPEs cpe:2.3:a:pac4j:pac4j:*:*:*:*:*:*:*:*
Vendors & Products Pac4j
Pac4j pac4j

Wed, 04 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators.
Title pac4j-jwt JwtAuthenticator Authentication Bypass
Weaknesses CWE-347
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L'}

cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-11T15:00:54.781Z

Reserved: 2026-03-03T16:42:01.012Z

Link: CVE-2026-29000

cve-icon Vulnrichment

Updated: 2026-03-05T16:21:48.858Z

cve-icon NVD

Status : Deferred

Published: 2026-03-04T22:16:18.783

Modified: 2026-04-16T16:18:36.200

Link: CVE-2026-29000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:15:06Z

Weaknesses