Missing critical step in authentication in Apache HttpClient 5.6 allows an attacker to cause the client to accept SCRAM-SHA-256 authentication without proper mutual authentication verification. Users are recommended to upgrade to version 5.6.1, which fixes this issue.

Project Subscriptions

Vendors Products
Httpclient Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
References

Wed, 22 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache httpclient
Vendors & Products Apache
Apache httpclient

Wed, 22 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description Missing critical step in authentication in Apache HttpClient 5.6 allows an attacker to cause the client to accept SCRAM-SHA-256 authentication without proper mutual authentication verification. Users are recommended to upgrade to version 5.6.1, which fixes this issue.
Title Apache HttpClient: SCRAM-SHA-256 mutual authentication bypass may cause the client to accept authentication without proper mutual authentication verification
Weaknesses CWE-304
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-22T16:23:59.296Z

Reserved: 2026-04-14T09:11:14.268Z

Link: CVE-2026-40542

cve-icon Vulnrichment

Updated: 2026-04-22T16:23:59.296Z

cve-icon NVD

Status : Received

Published: 2026-04-22T08:16:12.780

Modified: 2026-04-22T17:16:43.580

Link: CVE-2026-40542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T09:30:13Z

Weaknesses