CVE-2026-23901
LOWApache Shiro <2.0.7 - Info Disclosure
Title source: llmDescription
Observable Timing Discrepancy vulnerability in Apache Shiro. This issue affects Apache Shiro: from 1.*, 2.* before 2.0.7. Users are recommended to upgrade to version 2.0.7 or later, which fixes the issue. Prior to Shiro 2.0.7, code paths for non-existent vs. existing users are different enough, that a brute-force attack may be able to tell, by timing the requests only, determine if the request failed because of a non-existent user vs. wrong password. The most likely attack vector is a local attack only. Shiro security model https://shiro.apache.org/security-model.html#username_enumeration discusses this as well. Typically, brute force attack can be mitigated at the infrastructure level.
Scores
CVSS v3
2.5
EPSS
0.0001
EPSS Percentile
0.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Classification
CWE
CWE-208
Status
published
Affected Products (2)
apache/shiro
< 2.0.7
org.apache.shiro/shiro-core
< 2.1.0Maven
Timeline
Published
Feb 10, 2026
Tracked Since
Feb 18, 2026