Authentication Bypass Vulnerability
Description
Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with . in the regular expression are possibly vulnerable to an authorization bypass.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Shiro before 1.9.1 allows authorization bypass via misconfigured RegexRequestMatcher using '.' patterns on some servlet containers.
Vulnerability
Analysis
CVE-2022-32532 is an authorization bypass vulnerability in Apache Shiro versions prior to 1.9.1. The flaw exists in the RegexRequestMatcher component when using RegExPatternMatcher configurations. If the regular expression pattern includes a . (dot), it can be misconfigured to be bypassed on certain servlet containers, allowing unauthorized requests to pass through security checks [1][2].
Exploitation
Exploitation requires an application using Apache Shiro's regex-based request matching with a pattern that contains a literal dot (e.g., to match a specific URL path). On some servlet containers, the dot may not be matched as expected, causing the request matcher to incorrectly consider a request as not matching the pattern, thereby skipping authorization enforcement. No authentication is needed to trigger the bypass; the attacker simply sends a crafted request to a protected resource [1].
Impact
Successful exploitation could allow an unauthenticated attacker to access resources that are intended to be protected by authorization rules. This can lead to exposure of sensitive functionality or data, depending on what the bypassed pattern was meant to secure [1].
Mitigation
Apache Shiro 1.9.1 and later contain a fix for this issue. Users are advised to upgrade to the latest version. For applications that cannot immediately upgrade, reviewing and adjusting regex patterns to avoid reliance on literal dots in RegExPatternMatcher may reduce risk [1][2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.shiro:shiro-coreMaven | < 1.9.1 | 1.9.1 |
Affected products
2- Apache Software Foundation/Apache Shirov5Range: Before 1.9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-4cf5-xmhp-3xj7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-32532ghsaADVISORY
- lists.apache.org/thread/y8260dw8vbm99oq7zv6y3mzn5ovk90xhghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.