Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23903: CWE-289 Authentication Bypass by Alternate Name in Apache Software Foundation Apache Shiro

0
Unknown
VulnerabilityCVE-2026-23903cvecve-2026-23903cwe-289
Published: Mon Feb 09 2026 (02/09/2026, 09:26:21 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Shiro

Description

Authentication Bypass by Alternate Name vulnerability in Apache Shiro. This issue affects Apache Shiro: before 2.0.7. Users are recommended to upgrade to version 2.0.7, which fixes the issue. The issue only effects static files. If static files are served from a case-insensitive filesystem, such as default macOS setup, static files may be accessed by varying the case of the filename in the request. If only lower-case (common default) filters are present in Shiro, they may be bypassed this way. Shiro 2.0.7 and later has a new parameters to remediate this issue shiro.ini: filterChainResolver.caseInsensitive = true application.propertie: shiro.caseInsensitive=true Shiro 3.0.0 and later (upcoming) makes this the default.

AI-Powered Analysis

AILast updated: 02/09/2026, 10:00:52 UTC

Technical Analysis

CVE-2026-23903 is a vulnerability classified under CWE-289 (Authentication Bypass) affecting Apache Shiro versions before 2.0.7. Apache Shiro is a widely used Java security framework that provides authentication, authorization, cryptography, and session management. The vulnerability specifically affects the handling of static files served by Shiro when deployed on case-insensitive filesystems, such as the default macOS filesystem. In such environments, attackers can manipulate the case of filenames in HTTP requests to bypass filters that only check for lower-case filenames. This bypass allows unauthorized access to static resources that should be protected by Shiro's security filters. The root cause is that the filter chain resolver in Shiro does not correctly handle case variations, leading to an authentication bypass scenario. The issue does not affect dynamic content or other Shiro functionalities but is limited to static file access control. Apache Shiro 2.0.7 introduces new configuration parameters (e.g., filterChainResolver.caseInsensitive and shiro.caseInsensitive) to enable proper case-insensitive handling and prevent this bypass. The upcoming Shiro 3.0.0 will enable this behavior by default. There are no known exploits reported in the wild as of the publication date. The vulnerability requires no authentication or user interaction, making it relatively easy to exploit in affected environments. Organizations using Apache Shiro on case-insensitive filesystems with default or lower-case-only filters are at risk.

Potential Impact

For European organizations, the impact of CVE-2026-23903 can be significant, especially for those relying on Apache Shiro to protect static web resources. Unauthorized access to static files could lead to exposure of sensitive information, intellectual property, or configuration files that should be restricted. This could facilitate further attacks such as information gathering, social engineering, or exploitation of other vulnerabilities. The vulnerability undermines the integrity of access controls and compromises confidentiality. While it does not directly affect availability, the breach of access controls can have cascading effects on organizational security posture. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks and reputational damage if exploited. The ease of exploitation on common case-insensitive filesystems increases the likelihood of attacks, particularly in development, testing, or mixed OS environments common in European enterprises. However, organizations using case-sensitive filesystems or those that have upgraded to Shiro 2.0.7 or later are not affected.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability by upgrading Apache Shiro to version 2.0.7 or later. For environments where upgrading is not immediately feasible, administrators should configure the new parameters introduced in 2.0.7 to enforce case-insensitive filtering explicitly (e.g., set filterChainResolver.caseInsensitive=true in shiro.ini or shiro.caseInsensitive=true in application.properties). Additionally, organizations should audit their deployment environments to identify if static files are served from case-insensitive filesystems and verify the filter configurations to ensure they do not rely solely on lower-case filters. Implementing strict access controls at the web server or reverse proxy level can provide an additional layer of defense. Regular security assessments and penetration testing should include checks for case sensitivity issues in access controls. Monitoring logs for unusual access patterns involving case variations in URLs can help detect exploitation attempts. Finally, educating developers and system administrators about this vulnerability and the importance of consistent case handling in security filters is recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-19T01:14:40.103Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6989ace74b57a58fa13edb26

Added to database: 2/9/2026, 9:46:15 AM

Last enriched: 2/9/2026, 10:00:52 AM

Last updated: 2/9/2026, 12:25:12 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats