<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2371 Information about the pac4j-jwt security vulnerability (CVE-2026-29000)</title><link>https://community.appian.com/support/w/kb/3782/kb-2371-information-about-the-pac4j-jwt-security-vulnerability-cve-2026-29000</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2371 Information about the pac4j-jwt security vulnerability (CVE-2026-29000)</title><link>https://community.appian.com/support/w/kb/3782/kb-2371-information-about-the-pac4j-jwt-security-vulnerability-cve-2026-29000</link><pubDate>Mon, 09 Mar 2026 15:06:48 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:d5bb1928-4d0d-45d3-81d2-25a7f476c352</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3782/kb-2371-information-about-the-pac4j-jwt-security-vulnerability-cve-2026-29000#comments</comments><description>Current Revision posted to Appian Knowledge Base by pauline.delacruz on 3/9/2026 3:06:48 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 05 March 2026, a critical vulnerability was &lt;/span&gt;&lt;a href="https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-key"&gt;&lt;span style="font-weight:400;"&gt;discovered&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; related to the pac4j-jwt library that affects multiple versions of the security framework. Applications using affected versions of the JwtAuthenticator implementation may process maliciously crafted, encrypted JSON Web Tokens (JWE) in a way that allows an attacker to bypass authentication and gain unauthorized access to protected resources. Affected pac4j-jwt versions include 4.x (prior to 4.5.9), 5.x (prior to 5.7.9), and 6.x (prior to 6.3.3).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated this vulnerability and its services, and determined that it is not impacted, &lt;/span&gt;&lt;span style="font-weight:400;"&gt;as pac4j-jwt is not utilized within the Appian Cloud environment or any of Appian&amp;rsquo;s products. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29000"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-29000&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (pac4j-jwt JwtAuthenticator Authentication Bypass)&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-key"&gt;https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-key&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29000"&gt;&lt;span style="font-weight:400;"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-29000&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-29000"&gt;&lt;span style="font-weight:400;"&gt;https://www.cve.org/CVERecord?id=CVE-2026-29000&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.pac4j.org/blog/security-advisory-pac4j-jwt-jwtauthenticator.html"&gt;https://www.pac4j.org/blog/security-advisory-pac4j-jwt-jwtauthenticator.html&lt;/a&gt;&lt;a href="https://www.pac4j.org/blog/security-advisory-pac4j-jwt-jwtauthenticator.html"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span&gt;March 9, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2371 Information about the pac4j-jwt security vulnerability (CVE-2026-29000)</title><link>https://community.appian.com/support/w/kb/3782/kb-2371-information-about-the-pac4j-jwt-security-vulnerability-cve-2026-29000/revision/1</link><pubDate>Mon, 09 Mar 2026 15:06:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:d5bb1928-4d0d-45d3-81d2-25a7f476c352</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3782/kb-2371-information-about-the-pac4j-jwt-security-vulnerability-cve-2026-29000#comments</comments><description>Revision 1 posted to Appian Knowledge Base by pauline.delacruz on 3/9/2026 3:06:17 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 05 March 2026, a critical vulnerability was &lt;/span&gt;&lt;a href="https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-key"&gt;&lt;span style="font-weight:400;"&gt;discovered&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; related to the pac4j-jwt library that affects multiple versions of the security framework. Applications using affected versions of the JwtAuthenticator implementation may process maliciously crafted, encrypted JSON Web Tokens (JWE) in a way that allows an attacker to bypass authentication and gain unauthorized access to protected resources. Affected pac4j-jwt versions include 4.x (prior to 4.5.9), 5.x (prior to 5.7.9), and 6.x (prior to 6.3.3).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated this vulnerability and its services, and determined that it is not impacted, &lt;/span&gt;&lt;span style="font-weight:400;"&gt;as pac4j-jwt is not utilized within the Appian Cloud environment or any of Appian&amp;rsquo;s products. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29000"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-29000&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (pac4j-jwt JwtAuthenticator Authentication Bypass)&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-key&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-29000"&gt;&lt;span style="font-weight:400;"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-29000&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-29000"&gt;&lt;span style="font-weight:400;"&gt;https://www.cve.org/CVERecord?id=CVE-2026-29000&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.pac4j.org/blog/security-advisory-pac4j-jwt-jwtauthenticator.html"&gt;https://www.pac4j.org/blog/security-advisory-pac4j-jwt-jwtauthenticator.html&lt;/a&gt;&lt;a href="https://www.pac4j.org/blog/security-advisory-pac4j-jwt-jwtauthenticator.html"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span&gt;March 9, 2026&lt;/span&gt;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>