Description
pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators.
Exploits (15)
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-29000
nomisec
WORKING POC
by PtechAmanja · poc
https://github.com/PtechAmanja/CVE-2026-29000-pac4j-jwt-auth-bypass
nomisec
WORKING POC
by alihussainzada · poc
https://github.com/alihussainzada/CVE-2026-29000-Python-PoC-pac4j-JWT-AuthenticationBypass-Poc
nomisec
WORKING POC
by manbahadurthapa1248 · poc
https://github.com/manbahadurthapa1248/CVE-2026-29000---pac4j-jwt-Authentication-Bypass-PoC
nomisec
WORKING POC
by rootdirective-sec · poc
https://github.com/rootdirective-sec/CVE-2026-29000-Lab
References (3)
Scores
CVSS v3
9.1
EPSS
0.0012
EPSS Percentile
31.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Lab Environment
Details
CWE
CWE-347
Status
published
Products (4)
org.pac4j/pac4j-jwt
6.0.4.1 - 6.3.3Maven
pac4j/pac4j-jwt
4.0 - 4.5.9
pac4j/pac4j-jwt
5.0 - 5.7.9
pac4j/pac4j-jwt
6.0 - 6.3.3
Published
Mar 04, 2026
Tracked Since
Mar 05, 2026