Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

CVE-2026-29000: Authentication Bypass in pac4j-jwt Java Library

On 03 March 2026, pac4j released fixes for a maximum severity vulnerability in pac4j-jwt, tracked as CVE-2026-29000.
Arctic Wolf Security Bulletin
6 min read

On 03 March 2026, pac4j released fixes for a maximum severity vulnerability in pac4j-jwt, tracked as CVE-2026-29000. The flaw arises from improper verification of cryptographic signatures in the JwtAuthenticator component when processing encrypted JWTs (JWE). A remote, unauthenticated threat actor who knows the server’s RSA public key can bypass authentication and impersonate arbitrary users (including administrators) by submitting a crafted JWE whose inner token is an unsigned PlainJWT.

Technical Details

When JwtAuthenticator decrypts a JWE, it attempts to parse the inner token as a SignedJWT. If the inner token is a PlainJWT (alg=none), the SignedJWT object is null and the signature verification path is skipped due to a logic error. The code then builds a user profile from unverified claims, enabling full impersonation. Impacted deployments are those using RSA-based JWE together with JwtAuthenticator configured with both EncryptionConfiguration and SignatureConfiguration.

At the time of writing, Arctic Wolf has not observed any reports of active exploitation. A public proof-of-concept exists in addition to a technical writeup.

Recommendations for CVE-2026-29000

Upgrade to Latest Fixed Release

Arctic Wolf strongly recommends that customers upgrade to the latest fixed release of pac4j-jwt.

Product Affected Version Fixed Version
pac4j-jwt (org.pac4j:pac4j-jwt) Prior to 4.5.9 4.5.9 or newer
Prior to 5.7.9 5.7.9 or newer
Prior to 6.3.3 6.3.3 or newer

 

Please follow your organisation’s patching and testing guidelines to minimise potential operational impact.

References

Share this post: