
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical authentication bypass vulnerability (CVE-2021-37580) was discovered in Apache ShenYu Admin. The vulnerability stems from incorrect implementation of JWT (JSON Web Token) in ShenyuAdminBootstrap component, which allows attackers to bypass authentication mechanisms. This security flaw affects Apache ShenYu versions 2.3.0 and 2.4.0 (NVD, CVE).
The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified as CWE-287 (Improper Authentication), indicating a fundamental flaw in the authentication mechanism. The CVSS score and vector string suggest that the vulnerability can be exploited remotely with low attack complexity, requires no privileges or user interaction, and can result in high impact on confidentiality, integrity, and availability (NVD).
The vulnerability allows unauthorized access to the Apache ShenYu Admin interface by bypassing the authentication mechanism. Given the CVSS metrics, successful exploitation could lead to complete compromise of system confidentiality, integrity, and availability, potentially allowing attackers to gain unauthorized administrative access to the system (NVD).
Users running affected versions (Apache ShenYu 2.3.0 and 2.4.0) should upgrade to a patched version of the software. The vulnerability was reported and acknowledged by the Apache Software Foundation (Apache Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."