Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23903: CWE-289 Authentication Bypass by Alternate Name in Apache Software Foundation Apache Shiro

0
Medium
VulnerabilityCVE-2026-23903cvecve-2026-23903cwe-289
Published: Mon Feb 09 2026 (02/09/2026, 09:26:21 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Shiro

Description

CVE-2026-23903 is an authentication bypass vulnerability in Apache Shiro versions prior to 2. 0. 7. It affects static file access on case-insensitive filesystems, allowing attackers to bypass lower-case filters by altering the case of filenames in requests. This can lead to unauthorized access to static resources without authentication. The vulnerability has a CVSS score of 5. 3 (medium severity) and does not impact integrity or availability, only confidentiality to a limited extent. Apache Shiro 2. 0. 7 introduces configuration parameters to mitigate this issue, and version 3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/16/2026, 13:23:26 UTC

Technical Analysis

CVE-2026-23903 is a medium-severity authentication bypass vulnerability in the Apache Shiro framework affecting versions before 2.0.7. The issue arises from how Shiro handles static file requests on case-insensitive filesystems, such as the default macOS setup. When static files are served, Shiro applies filters to restrict access, commonly using lower-case filters. However, due to case insensitivity at the filesystem level, an attacker can vary the case of the filename in the HTTP request to bypass these filters, effectively circumventing authentication controls intended to protect static resources. This vulnerability is classified under CWE-289 (Authentication Bypass). The flaw does not require authentication or user interaction and can be exploited remotely over the network. The impact is limited to confidentiality as unauthorized users may access static files that should be protected. Apache Shiro 2.0.7 addresses this by introducing configuration options (filterChainResolver.caseInsensitive and shiro.caseInsensitive) to properly handle case sensitivity in filtering. The upcoming 3.0.0 release will enable case-insensitive filtering by default, further securing static file access. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be mitigated promptly.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive static files served by applications using vulnerable Apache Shiro versions on case-insensitive filesystems. While the impact is limited to confidentiality and does not affect integrity or availability, exposure of static resources could include sensitive configuration files, documentation, or other data that may aid further attacks or leak sensitive information. Organizations in sectors with strict data protection regulations (e.g., GDPR) could face compliance risks if sensitive data is exposed. The risk is higher for organizations using macOS or other case-insensitive filesystems in their deployment environments. Since the vulnerability does not require authentication or user interaction, it can be exploited by remote attackers, increasing the threat surface. However, the absence of known exploits in the wild reduces immediate risk, though proactive mitigation is essential to prevent future exploitation.

Mitigation Recommendations

European organizations should immediately upgrade Apache Shiro to version 2.0.7 or later to remediate this vulnerability. For environments where immediate upgrade is not feasible, configure the new parameters to enforce case sensitivity in filtering: set 'filterChainResolver.caseInsensitive = true' in shiro.ini or 'shiro.caseInsensitive=true' in application.properties to ensure proper handling of case variations. Conduct an audit of static file serving configurations to identify any sensitive files that may be exposed due to case-insensitive filesystem behavior. Implement strict access controls and consider serving static files from case-sensitive filesystems or using web server configurations that enforce case sensitivity. Monitor web server logs for unusual access patterns involving case variations in filenames. Additionally, integrate this vulnerability into vulnerability management and patching workflows to ensure timely updates. Educate development and operations teams about the importance of case sensitivity in security filtering.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-19T01:14:40.103Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6989ace74b57a58fa13edb26

Added to database: 2/9/2026, 9:46:15 AM

Last enriched: 2/16/2026, 1:23:26 PM

Last updated: 3/26/2026, 9:48:38 PM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses