CVE-2026-23903
MEDIUMApache Shiro <2.0.7 - Auth Bypass
Title source: llmDescription
Authentication Bypass by Alternate Name vulnerability in Apache Shiro. This issue affects Apache Shiro: before 2.0.7. Users are recommended to upgrade to version 2.0.7, which fixes the issue. The issue only effects static files. If static files are served from a case-insensitive filesystem, such as default macOS setup, static files may be accessed by varying the case of the filename in the request. If only lower-case (common default) filters are present in Shiro, they may be bypassed this way. Shiro 2.0.7 and later has a new parameters to remediate this issue shiro.ini: filterChainResolver.caseInsensitive = true application.propertie: shiro.caseInsensitive=true Shiro 3.0.0 and later (upcoming) makes this the default.
Scores
CVSS v3
5.3
EPSS
0.0012
EPSS Percentile
30.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Classification
CWE
CWE-289
Status
published
Affected Products (2)
apache/shiro
< 2.0.7
org.apache.shiro/shiro-spring
< 2.1.0Maven
Timeline
Published
Feb 09, 2026
Tracked Since
Feb 18, 2026