CVE-2026-23903 PUBLISHED

Apache Shiro: Auth bypass when accessing static files only on case-insensitive filesystems

Assigner: apache
Reserved: 19.01.2026 Published: 09.02.2026 Updated: 09.02.2026

Authentication Bypass by Alternate Name vulnerability in Apache Shiro.

This issue affects Apache Shiro: before 2.0.7.

Users are recommended to upgrade to version 2.0.7, which fixes the issue.

The issue only effects static files. If static files are served from a case-insensitive filesystem, such as default macOS setup, static files may be accessed by varying the case of the filename in the request. If only lower-case (common default) filters are present in Shiro, they may be bypassed this way.

Shiro 2.0.7 and later has a new parameters to remediate this issue shiro.ini: filterChainResolver.caseInsensitive = true application.propertie: shiro.caseInsensitive=true

Shiro 3.0.0 and later (upcoming) makes this the default.

Product Status

Vendor Apache Software Foundation
Product Apache Shiro
Versions Default: unaffected
  • affected from 0 to 2.0.7 (excl.)

Credits

  • Jesse Yang finder
  • Lenny Pimak remediation developer

References

Problem Types

  • CWE-289 Authentication Bypass by Alternate Name CWE