EUVD-2026-20473

| CVE-2026-5795 HIGH
2026-04-08 eclipse GHSA-gc59-r5jq-98qw
7.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

4
Patch Released
Apr 09, 2026 - 02:30 nvd
Patch available
Analysis Generated
Apr 08, 2026 - 14:16 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 14:16 euvd
EUVD-2026-20473
CVE Published
Apr 08, 2026 - 13:32 nvd
HIGH 7.4

Description

In Eclipse Jetty, the class JASPIAuthenticator initiates the authentication checks, which set two ThreadLocal variable. Upon returning from the initial checks, there are conditions that cause an early return from the JASPIAuthenticator code without clearing those ThreadLocals. A subsequent request using the same thread inherits the ThreadLocal values, leading to a broken access control and privilege escalation.

Analysis

Privilege escalation in Eclipse Jetty 9.4.0-12.1.7 allows unauthenticated remote attackers to bypass authentication via ThreadLocal variable pollution in JASPIAuthenticator. Early returns from authentication checks fail to clear ThreadLocal values, causing subsequent requests on the same thread to inherit elevated privileges. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all Eclipse Jetty deployments and identify instances running versions 9.4.0-12.1.7; document thread pool configurations and authentication mechanisms in use. Within 7 days: Implement the compensating control of dedicated thread pools per security context or disable thread reuse where operationally feasible; evaluate upgrade feasibility to versions 9.4.53+ or 12.1.8+ once released by vendor. …

Sign in for detailed remediation steps.

Priority Score

37
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +37
POC: 0

Share

EUVD-2026-20473 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy