Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23906: CWE-287 Improper Authentication in Apache Software Foundation Apache Druid

0
Critical
VulnerabilityCVE-2026-23906cvecve-2026-23906cwe-287
Published: Tue Feb 10 2026 (02/10/2026, 09:28:09 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Druid

Description

Affected Products and Versions * Apache Druid * Affected Versions: 0.17.0 through 35.x (all versions prior to 36.0.0) * Prerequisites: * druid-basic-security extension enabled * LDAP authenticator configured * Underlying LDAP server permits anonymous bind                                                                                                                                                    Vulnerability Description An authentication bypass vulnerability exists in Apache Druid when using the druid-basic-security extension with LDAP authentication. If the underlying LDAP server is configured to allow anonymous binds, an attacker can bypass authentication by providing an existing username with an empty password. This allows unauthorized access to otherwise restricted Druid resources without valid credentials. The vulnerability stems from improper validation of LDAP authentication responses when anonymous binds are permitted, effectively treating anonymous bind success as valid user authentication. Impact A remote, unauthenticated attacker can: * Gain unauthorized access to the Apache Druid cluster * Access sensitive data stored in Druid datasources * Execute queries and potentially manipulate data * Access administrative interfaces if the bypassed account has elevated privileges * Completely compromise the confidentiality, integrity, and availability of the Druid deployment                                                                                                                                                                                     Mitigation   Immediate Mitigation (No Druid Upgrade Required):                                                                                                                                                   * Disable anonymous bind on your LDAP server. This prevents the vulnerability from being exploitable and is the recommended immediate action. Resolution * Upgrade Apache Druid to version 36.0.0 or later, which includes fixes to properly reject anonymous LDAP bind attempts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 09:46:08 UTC

Technical Analysis

Apache Druid, a high-performance real-time analytics database, is affected by a critical authentication bypass vulnerability (CVE-2026-23906) in versions 0.17.0 through 35.x when the druid-basic-security extension is enabled with LDAP authentication. The root cause is improper handling of LDAP authentication responses when the underlying LDAP server allows anonymous binds. Specifically, if the LDAP server permits anonymous binding, an attacker can submit an existing username with an empty password, and the system incorrectly treats the anonymous bind success as valid authentication. This flaw allows remote, unauthenticated attackers to bypass authentication controls and gain unauthorized access to the Druid cluster. Once inside, attackers can access sensitive data stored in Druid datasources, execute arbitrary queries, manipulate data, and potentially access administrative interfaces if the compromised account has elevated privileges. This compromises the confidentiality, integrity, and availability of the entire Druid deployment. The vulnerability does not require any user interaction or prior authentication, making exploitation straightforward. The recommended immediate mitigation is to disable anonymous binds on the LDAP server, which prevents exploitation without requiring an immediate Druid upgrade. The definitive fix is included in Apache Druid version 36.0.0 and later, which properly rejects anonymous LDAP bind attempts during authentication. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations using Apache Druid with LDAP authentication and the druid-basic-security extension, this vulnerability poses a severe risk. Unauthorized attackers can remotely bypass authentication controls without credentials, leading to full compromise of sensitive analytics data and operational control. This can result in data breaches involving personal or business-critical information, manipulation or deletion of analytics data, disruption of business intelligence operations, and potential lateral movement within the network if administrative interfaces are accessed. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure that rely on Druid for real-time analytics are particularly at risk. The breach of confidentiality and integrity could lead to regulatory non-compliance under GDPR and other data protection laws, resulting in legal and financial penalties. Availability impacts could disrupt decision-making processes and operational continuity. The ease of exploitation and lack of required authentication make this vulnerability attractive to attackers, increasing the likelihood of targeted attacks or opportunistic exploitation in Europe.

Mitigation Recommendations

1. Immediately disable anonymous bind capabilities on the LDAP servers used for Apache Druid authentication. This is the most effective short-term mitigation and does not require upgrading Druid. 2. Upgrade Apache Druid to version 36.0.0 or later as soon as possible, which includes a fix that properly rejects anonymous LDAP bind attempts and enforces correct authentication validation. 3. Audit LDAP server configurations regularly to ensure anonymous binds remain disabled and review access logs for suspicious bind attempts. 4. Implement network segmentation and access controls to limit exposure of the Druid cluster and LDAP servers to only trusted internal networks or VPNs. 5. Monitor Druid logs and query activity for unusual patterns that may indicate exploitation attempts or unauthorized access. 6. Employ multi-factor authentication (MFA) where possible on administrative interfaces to reduce risk if credentials are compromised. 7. Conduct security awareness and incident response drills focused on detecting and responding to authentication bypass scenarios. 8. Review and tighten role-based access controls within Druid to minimize privileges granted to users, limiting potential damage from compromised accounts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-19T08:57:10.063Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698afe6e4b57a58fa1f9010e

Added to database: 2/10/2026, 9:46:22 AM

Last enriched: 2/18/2026, 9:46:08 AM

Last updated: 3/27/2026, 2:16:05 PM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses