CVE-2023-26049
Java vulnerability analysis and mitigation

Overview

Jetty, a Java based web server and servlet engine, contains a vulnerability (CVE-2023-26049) related to nonstandard cookie parsing. The vulnerability was discovered and disclosed in April 2023. When Jetty encounters a cookie VALUE starting with a double quote, it continues reading the cookie string until finding a closing quote, even if semicolons are present. This behavior affects versions through 9.4.50, through 10.0.13, through 11.0.13, and through 12.0.0.alpha3 (GitHub Advisory).

Technical details

The vulnerability stems from Jetty's cookie parsing mechanism. For example, if a cookie header contains DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d", Jetty will parse it as one cookie with name DISPLAY_LANGUAGE and value b; JSESSIONID=1337; c=d instead of three separate cookies. The vulnerability has been assigned a CVSS v3.1 base score of 5.3 MEDIUM with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (NVD).

Impact

The vulnerability allows an attacker to smuggle cookies within other cookies. If JSESSIONID is an HttpOnly cookie and DISPLAYLANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAYLANGUAGE cookie and exfiltrate it. This is particularly significant when an intermediary enforces policies based on cookies, as smuggled cookies can bypass these policies while still being processed by the Jetty server (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0. Users are advised to upgrade to these patched versions. There are no known workarounds for this vulnerability (GitHub Advisory). The fixes were implemented through pull requests #9339 and #9352, which introduced more stringent cookie parsing rules (Jetty PR).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61734HIGH7.5
  • JavaJava
  • org.apache.kylin:kylin-common-server
NoYesOct 02, 2025
CVE-2025-61733HIGH7.5
  • JavaJava
  • org.apache.kylin:kylin
NoYesOct 02, 2025
CVE-2025-61735HIGH7.3
  • JavaJava
  • org.apache.kylin:kylin
NoYesOct 02, 2025
CVE-2025-43827MEDIUM5.3
  • JavaJava
  • com.liferay:com.liferay.portal.security.audit.storage.service
NoYesSep 30, 2025
CVE-2025-43826MEDIUM4.8
  • JavaJava
  • cpe:2.3:a:liferay:liferay_portal
NoYesSep 30, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management