Skip to content

Commit 768e5e5

Browse files
committed
fix(security): upgrade pac4j-jwt to 4.5.9 for CVE-2026-29000
Upgrade pac4j from 4.0.0 to 4.5.9 to address CVE-2026-29000, a critical authentication bypass vulnerability (CVSS 9.1) in pac4j-jwt. The vulnerability allows attackers with access to the server's RSA public key to forge authentication tokens by wrapping a PlainJWT in JWE, effectively bypassing signature verification and authenticating as any user, including administrators. This is particularly critical for healthcare applications like WebAPI that handle sensitive patient data. Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-29000
1 parent b22d7bf commit 768e5e5

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@
3232
<jersey.version>2.14</jersey.version>
3333
<SqlRender.version>1.19.1</SqlRender.version>
3434
<hive-jdbc.version>3.1.2</hive-jdbc.version>
35-
<pac4j.version>4.0.0</pac4j.version>
35+
<pac4j.version>4.5.9</pac4j.version>
3636
<jackson.version>2.12.7</jackson.version>
3737
<start-class>org.ohdsi.webapi.WebApi</start-class>
3838
<skipUnitTests>false</skipUnitTests>

0 commit comments

Comments
 (0)