Home

Description

Observable Timing Discrepancy vulnerability in Apache Shiro. This issue affects Apache Shiro: from 1.*, 2.* before 2.0.7. Users are recommended to upgrade to version 2.0.7 or later, which fixes the issue. Prior to Shiro 2.0.7, code paths for non-existent vs. existing users are different enough, that a brute-force attack may be able to tell, by timing the requests only, determine if the request failed because of a non-existent user vs. wrong password. The most likely attack vector is a local attack only. Shiro security model https://shiro.apache.org/security-model.html#username_enumeration discusses this as well. Typically, brute force attack can be mitigated at the infrastructure level.

PUBLISHED Reserved 2026-01-17 | Published 2026-02-10 | Updated 2026-02-10 | Assigner apache




LOW: 1.0CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/S:N/AU:Y/R:A/V:C/RE:L/U:Green

Problem types

CWE-208 Observable Timing Discrepancy

Product status

Default status
unaffected

Any version before 2.0.7
affected

Credits

4ra1n finder

Y4tacker finder

lprimak remediation developer

References

www.openwall.com/lists/oss-security/2026/02/08/2

lists.apache.org/thread/mm1jct9b86jvnh3y44tj22xvjtx3xhhh vendor-advisory

cve.org (CVE-2026-23901)

nvd.nist.gov (CVE-2026-23901)

Download JSON