CVE-2026-23903

MEDIUM

Apache Shiro <2.0.7 - Auth Bypass

Title source: llm

Description

Authentication Bypass by Alternate Name vulnerability in Apache Shiro. This issue affects Apache Shiro: before 2.0.7. Users are recommended to upgrade to version 2.0.7, which fixes the issue. The issue only effects static files. If static files are served from a case-insensitive filesystem, such as default macOS setup, static files may be accessed by varying the case of the filename in the request. If only lower-case (common default) filters are present in Shiro, they may be bypassed this way. Shiro 2.0.7 and later has a new parameters to remediate this issue shiro.ini: filterChainResolver.caseInsensitive = true application.propertie: shiro.caseInsensitive=true Shiro 3.0.0 and later (upcoming) makes this the default.

Scores

CVSS v3 5.3
EPSS 0.0012
EPSS Percentile 30.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Classification

CWE
CWE-289
Status published

Affected Products (2)

apache/shiro < 2.0.7
org.apache.shiro/shiro-spring < 2.1.0Maven

Timeline

Published Feb 09, 2026
Tracked Since Feb 18, 2026