Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-29000— pac4j-jwt JwtAuthenticator Authentication Bypass

CVSS 9.1 · Critical EPSS 0.09% · P25
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-29000

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
pac4j-jwt JwtAuthenticator Authentication Bypass
Source: NVD (National Vulnerability Database)
Vulnerability Description
pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
密码学签名的验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
pac4j-jwt 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
pac4j-jwt是pac4j开源的一个JWT认证模块。 pac4j-jwt 4.5.9之前版本、5.7.9之前版本和6.3.3之前版本存在数据伪造问题漏洞,该漏洞源于JwtAuthenticator在处理加密JWT时存在身份验证绕过问题,可能导致远程攻击者利用服务器的RSA公钥伪造身份验证令牌,从而以包括管理员在内的任何用户身份通过验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
pac4jpac4j-jwt 4.0 ~ 4.5.9 -

II. Public POCs for CVE-2026-29000

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-29000

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-29000

No comments yet


Leave a comment