Hi,

Where can I find the instructions to check whether my systems are affected by this?

I opened the link: https://www.cve.org/CVERecord?id=CVE-2026-23901 but I can’t find anything.

thanks.
Roberto.

Il 08-02-2026 17:30 Lenny Primak ha scritto:
Severity: low

Affected versions:

- Apache Shiro (org.apache.shiro:shiro-core) before 2.0.7

Description:

Observable Timing Discrepancy vulnerability in Apache Shiro.

This issue affects Apache Shiro: from 1.*, 2.* before 2.0.7.

Users are recommended to upgrade to version 2.0.7 or later, which
fixes the issue.

Prior to Shiro 2.0.7, code paths for non-existent vs. existing users
are different enough,
that a brute-force attack may be able to tell, by timing the requests
only, determine if
the request failed because of a non-existent user vs. wrong password.

The most likely attack vector is a local attack only.
Shiro security model 
https://shiro.apache.org/security-model.html#username_enumeration
 discusses this as well.

Typically, brute force attack can be mitigated at the infrastructure level.

Credit:

4ra1n (finder)
Y4tacker (finder)
lprimak (remediation developer)

References:

https://shiro.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-23901

Reply via email to