Cross-Site Request Forgery in PAC4J Affects Security Features
CVE-2026-40458

7HIGH

Key Information:

Vendor

Pac4j

Status
Vendor
CVE Published:
17 April 2026

What is CVE-2026-40458?

PAC4J is susceptible to Cross-Site Request Forgery (CSRF), allowing attackers to exploit vulnerabilities through crafted requests. By leveraging a collision in the deterministic String.hashCode() function, an attacker can forge CSRF tokens and bypass protective measures. This breach enables unauthorized actions such as profile changes, password modifications, and account linking without the victim's consent. To mitigate these risks, users must upgrade to PAC4J versions 5.7.10 or 6.4.1, where the issue has been resolved.

Affected Version(s)

PAC4J 5.0 < 5.7.10

PAC4J 6.0 < 6.4.1

References

CVSS V4

Score:
7
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bartłomiej Dmitruk, striga.ai
.