Home / CVE DB / CVE-2026-23901
Standard
Vulnerability Identifier

CVE-2026-23901

2026-02-10
Severity Assessment
2.5
LOW
CVSS v3.x Score
Clinical Analysis (Description)

Observable Timing Discrepancy vulnerability in Apache Shiro.

This issue affects Apache Shiro: from 1.*, 2.* before 2.0.7.

Users are recommended to upgrade to version 2.0.7 or later, which fixes the issue.

Prior to Shiro 2.0.7, code paths for non-existent vs. existing users are different enough,
that a brute-force attack may be able to tell, by timing the requests only, determine if
the request failed because of a non-existent user vs. wrong password.

The most likely attack vector is a local attack only.
Shiro security model  https://shiro.apache.org/security-model.html#username_enumeration  discusses this as well.

Typically, brute force attack can be mitigated at the infrastructure level.

Vector Sequencing

Attack Parameters

Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
Low
Confidentiality
None
Integrity
None
Availability
AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Weakness Classification

CWE-CWE-208

Affected Population

Affected Configurations

Total: 31 detected entries

Software List Scrollable
ap
shiro
Vendor: apache • v1.9.0
ap
shiro
Vendor: apache • v1.12.0
ap
shiro
Vendor: apache • v1.9.1
ap
shiro
Vendor: apache • v1.2.5
ap
shiro
Vendor: apache • v1.4.2
ap
shiro
Vendor: apache • v1.2.2
ap
shiro
Vendor: apache • v1.2.6
ap
shiro
Vendor: apache • v1.3.0
ap
shiro
Vendor: apache • v1.7.0
ap
shiro
Vendor: apache • v1.2.4
ap
shiro
Vendor: apache • v1.5.0
ap
shiro
Vendor: apache • v1.5.1
ap
shiro
Vendor: apache • v1.6.0
ap
shiro
Vendor: apache • v1.2.1
ap
shiro
Vendor: apache • v1.3.2
ap
shiro
Vendor: apache • v1.0.0
ap
shiro
Vendor: apache • v1.8.0
ap
shiro
Vendor: apache • v1.4.0
ap
shiro
Vendor: apache • v1.2.0
ap
shiro
Vendor: apache • v1.2.3
ap
shiro
Vendor: apache • v1.10.0
ap
shiro
Vendor: apache • v2.0.0
ap
shiro
Vendor: apache • v1.13.0
ap
shiro
Vendor: apache • v1.5.3
ap
shiro
Vendor: apache • v1.4.1
ap
shiro
Vendor: apache • v1.10.1
ap
shiro
Vendor: apache • v1.7.1
ap
shiro
Vendor: apache • v1.11.0
ap
shiro
Vendor: apache • v1.1.0
ap
shiro
Vendor: apache • v1.5.2
ap
shiro
Vendor: apache • v1.3.1
Timeline

Time Line

PUBLICATION
10 Feb 2026
MODIFICATION
12 Feb 2026
FIRST PATCH
21 Apr 2026
Impact Statistics

Key Metrics

CVSS Score
2.5
LOW
Products
31
Affected
Patches
1
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.