webProhard
Lab 354 — VaultAPI — JWT Authentication Bypass via JWE-Wrapped PlainJWT
hackadvisor
Task: Enterprise API management platform using JWE-encrypted JWT tokens (RSA-OAEP-256 + A256GCM wrapping RS256-signed JWTs) with pac4j-jwt library, goal is privilege escalation to admin. Solution: Exploit CVE-2026-29000 in pac4j-jwt — wrap a PlainJWT (alg:none) with admin claims and correct issuer inside JWE encrypted with the server's public key from JWKS, bypassing signature verification entirely.
$ ls tags/ techniques/
jwtauthentication_bypassjavanone_algorithmtoken_forgeryprivilege_escalationdecoy_flagspring_bootrsa_oaepjwksanti_bot_trapjwepac4jcve_2026_29000plaintext_jwt
decoy_flag_identificationcve_2026_29000_pac4j_plainjwt_bypassjwe_encryption_with_jwks_public_keyjwt_alg_none_signature_bypassprivilege_escalation_via_forged_claims
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 350 — VaultKeeper— hackadvisor
- [web][Pro]Lab 114 — APIForge — JWT JKU Header Injection for Privilege Escalation— hackadvisor
- [web][Pro]Lab 288 — VaultPay — 2FA Bypass via Pre-Authentication JWT— hackadvisor
- [web][Pro]Lab 12 — NewsGrid — JWT Algorithm Confusion— hackadvisor
- [web][Pro]Lab 262 — PulseBoard — JWT Signature Bypass via Google Sign-In— hackadvisor