Description
DEPRECATED: Authentication Bypass Issues vulnerability in digest authentication in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from before 7.0.0.
Older unsupported versions any also be affect

Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Published: 2026-05-12
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an authentication bypass in Tomcat's digest authenticator that allows any request with an unknown user name to be accepted as authenticated. This flaw lets an attacker perform all actions that a legitimate authenticated user can normally execute, including accessing protected resources and sensitive data. The weakness is defined by CWE-592, indicating improper handling of authentication information.

Affected Systems

Apache Tomcat versions 11.0.0-M1 through 11.0.21, 10.1.0-M1 through 10.1.54, 9.0.0.M1 through 9.0.117, 8.5.0 through 8.5.100, and all releases dated before 7.0.0 are vulnerable. Unsupported older releases are also likely affected.

Risk and Exploitability

The CVSS score is not disclosed in the public advisory, and the EPSS score is currently unavailable. The vulnerability is not listed in CISA's KEV database. Because the flaw is triggered before credential verification, it is likely exploitable over the network by any client that can reach the Tomcat instance. Attackers could masquerade as legitimate users and gain unauthorized access to protected resources.

Generated by OpenCVE AI on May 12, 2026 at 17:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache Tomcat to version 11.0.22, 10.1.55, or 9.0.118, which contain the fix for the authentication bypass.
  • If a patch cannot be applied immediately, disable or remove the digest authenticator configuration from your web.xml or context.xml files to prevent the vulnerability from being triggered until the update is applied.
  • Verify that application authentication now requires valid credentials by testing with known user accounts and ensuring that unknown user names are rejected.

Generated by OpenCVE AI on May 12, 2026 at 17:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache tomcat
Vendors & Products Apache
Apache tomcat

Tue, 12 May 2026 18:30:00 +0000

Type Values Removed Values Added
References

Tue, 12 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description DEPRECATED: Authentication Bypass Issues vulnerability in digest authentication in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from before 7.0.0. Older unsupported versions any also be affect Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Title Apache Tomcat: Digest authenticator will authenticate any unknown user
Weaknesses CWE-592
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-12T17:40:59.559Z

Reserved: 2026-05-01T16:19:22.016Z

Link: CVE-2026-43512

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-12T16:16:17.990

Modified: 2026-05-12T18:17:26.863

Link: CVE-2026-43512

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:45:05Z

Weaknesses