This issue was fixed in PAC4J versions 4.5.10, 5.7.10 and 6.4.1
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pac4j
Pac4j pac4j |
|
| Vendors & Products |
Pac4j
Pac4j pac4j |
Fri, 17 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PAC4J is vulnerable to LDAP Injection in multiple methods. A low-privileged remote attacker can inject crafted LDAP syntax into ID-based search parameters, potentially resulting in unauthorized LDAP queries and arbitrary directory operations. This issue was fixed in PAC4J versions 4.5.10, 5.7.10 and 6.4.1 | |
| Title | LDAP Injection in PAC4J | |
| Weaknesses | CWE-90 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-04-17T13:54:22.069Z
Reserved: 2026-04-13T10:06:07.141Z
Link: CVE-2026-40459
Updated: 2026-04-17T13:53:06.405Z
Status : Awaiting Analysis
Published: 2026-04-17T14:16:34.123
Modified: 2026-04-17T15:38:09.243
Link: CVE-2026-40459
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:45:20Z