CVE-2021-37580

CRITICAL EXPLOITED NUCLEI

Apache Shenyu < 2.4.1 - Authentication Bypass

Title source: rule

Description

A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0

Exploits (7)

nomisec WORKING POC 38 stars
by fengwenhua · remote
https://github.com/fengwenhua/CVE-2021-37580
nomisec WORKING POC 7 stars
by Liang2580 · poc
https://github.com/Liang2580/CVE-2021-37580
nomisec WORKING POC 5 stars
by ZororoZ · poc
https://github.com/ZororoZ/CVE-2021-37580
nomisec WORKING POC 4 stars
by rabbitsafe · poc
https://github.com/rabbitsafe/CVE-2021-37580
nomisec WORKING POC 1 stars
by CN016 · remote
https://github.com/CN016/Apache-ShenYu-Admin-JWT-CVE-2021-37580-
nomisec WORKING POC
by Wing-song · poc
https://github.com/Wing-song/CVE-2021-37580
nomisec SUSPICIOUS
by Osyanina · poc
https://github.com/Osyanina/westone-CVE-2021-37580-scanner

Nuclei Templates (1)

Apache ShenYu Admin JWT - Authentication Bypass
CRITICALby pdteam

Scores

CVSS v3 9.8
EPSS 0.9399
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-12-05
CWE
CWE-287
Status published
Products (3)
apache/shenyu 2.3.0
apache/shenyu 2.4.0
org.apache.shenyu/shenyu-admin 2.3.0 - 2.4.1Maven
Published Nov 16, 2021
Tracked Since Feb 18, 2026