Observable Timing Discrepancy vulnerability in Apache Shiro.
This issue affects Apache Shiro: from 1.*, 2.* before 2.0.7.
Users are recommended to upgrade to version 2.0.7 or later, which fixes the issue.
Prior to Shiro 2.0.7, code paths for non-existent vs. existing users are different enough,
that a brute-force attack may be able to tell, by timing the requests only, determine if
the request failed because of a non-existent user vs. wrong password.
The most likely attack vector is a local attack only.
Shiro security model https://shiro.apache.org/security-model.html#username_enumeration discusses this as well.
Typically, brute force attack can be mitigated at the infrastructure level.
References
| Link | Resource |
|---|---|
| https://lists.apache.org/thread/mm1jct9b86jvnh3y44tj22xvjtx3xhhh | Issue Tracking Third Party Advisory Mailing List |
| http://www.openwall.com/lists/oss-security/2026/02/08/2 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-02-10 10:15
Updated : 2026-02-12 15:30
NVD link : CVE-2026-23901
Mitre link : CVE-2026-23901
CVE.ORG link : CVE-2026-23901
JSON object : View
Products Affected
apache
- shiro
CWE
CWE-208
Observable Timing Discrepancy
