This issue was fixed in PAC4J versions 4.5.10, 5.7.10 and 6.4.1
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 17 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pac4j
Pac4j pac4j |
|
| Vendors & Products |
Pac4j
Pac4j pac4j |
Fri, 17 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PAC4J is vulnerable to LDAP Injection in multiple methods. A low-privileged remote attacker can inject crafted LDAP syntax into ID-based search parameters, potentially resulting in unauthorized LDAP queries and arbitrary directory operations. This issue was fixed in PAC4J versions 4.5.10, 5.7.10 and 6.4.1 | |
| Title | LDAP Injection in PAC4J | |
| Weaknesses | CWE-90 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-04-17T13:54:22.069Z
Reserved: 2026-04-13T10:06:07.141Z
Link: CVE-2026-40459
Updated: 2026-04-17T13:53:06.405Z
Status : Awaiting Analysis
Published: 2026-04-17T14:16:34.123
Modified: 2026-04-17T15:38:09.243
Link: CVE-2026-40459
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:45:20Z