GHSA-v468-qcjx-r72w

Suggest an improvement
Source
https://github.com/advisories/GHSA-v468-qcjx-r72w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-v468-qcjx-r72w/GHSA-v468-qcjx-r72w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v468-qcjx-r72w
Aliases
  • CVE-2026-40542
Downstream
Related
Published
2026-04-22T09:31:31Z
Modified
2026-05-05T16:11:04.000659Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Apache HttpClient accepts SCRAM-SHA-256 authentication without proper mutual authentication verification
Details

Missing critical step in authentication in Apache HttpClient 5.6 allows an attacker to cause the client to accept SCRAM-SHA-256 authentication without proper mutual authentication verification. Users are recommended to upgrade to version 5.6.1, which fixes this issue.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-04-29T20:52:54Z",
    "cwe_ids": [
        "CWE-304"
    ],
    "severity": "HIGH",
    "nvd_published_at": "2026-04-22T08:16:12Z"
}
References

Affected packages

Maven / org.apache.httpcomponents.client5:httpclient5

Package

Name
org.apache.httpcomponents.client5:httpclient5
View open source insights on deps.dev
Purl
pkg:maven/org.apache.httpcomponents.client5/httpclient5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.6-alpha1
Fixed
5.6.1

Affected versions

5.*
5.6-alpha1
5.6

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-v468-qcjx-r72w/GHSA-v468-qcjx-r72w.json"