fix(security): Upgrade pac4j-jwt to 4.5.9 (CVE-2026-29000)#2496
fix(security): Upgrade pac4j-jwt to 4.5.9 (CVE-2026-29000)#2496abhu85 wants to merge 1 commit intoOHDSI:masterfrom
Conversation
Upgrade pac4j from 4.0.0 to 4.5.9 to address CVE-2026-29000, a critical authentication bypass vulnerability (CVSS 9.1) in pac4j-jwt. The vulnerability allows attackers with access to the server's RSA public key to forge authentication tokens by wrapping a PlainJWT in JWE, effectively bypassing signature verification and authenticating as any user, including administrators. This is particularly critical for healthcare applications like WebAPI that handle sensitive patient data. Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-29000
768e5e5 to
49c6f13
Compare
|
The last time this was upgraded it broke authentication. So definitely need to be cautious on upgrading this one. Here is the hotfix that restored it: https://github.com/OHDSI/WebAPI/pull/2454/changes |
|
Thanks for the heads up @CyloNox - I looked into this. Good news: buji-pac4j 5.0.1's pom.xml declares compatibility with pac4j The previous breakage with 4.5.5 was likely due to runtime behavioral changes in pac4j, not a hard dependency conflict. Looking at the pac4j 4.x changelog, there were some breaking changes in profile handling and session management between minor versions. To mitigate risk, I can:
Would it help if I:
Given the CVE severity (9.1 CVSS - authentication bypass), I'd like to help find a safe path forward. Let me know what would work best for your team. |
Summary
This PR upgrades pac4j from version 4.0.0 to 4.5.9 to address CVE-2026-29000, a critical authentication bypass vulnerability.
Vulnerability Details
Description
The vulnerability in pac4j-jwt allows remote attackers to forge authentication tokens. An attacker with access to the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user, including administrators.
Impact
Given that WebAPI is a healthcare research platform handling sensitive patient data and cohort definitions, this authentication bypass vulnerability poses a significant risk. Attackers could potentially:
Changes
pac4j.versionproperty from4.0.0to4.5.9inpom.xmlTesting
References