Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0376 | Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default). |
Github GHSA |
GHSA-jc7h-c423-mpjc | Apache Shiro vulnerable to path traversal |
Ubuntu USN |
USN-7147-1 | Apache Shiro vulnerabilities |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-03T21:50:03.484Z
Reserved: 2023-10-25T18:55:02.833Z
Link: CVE-2023-46749
Updated: 2025-11-03T21:50:03.484Z
Status : Modified
Published: 2024-01-15T10:15:26.380
Modified: 2025-11-03T22:16:29.020
Link: CVE-2023-46749
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN