Missing critical step in authentication in Apache HttpClient 5.6 allows an attacker to cause the client to accept SCRAM-SHA-256 authentication without proper mutual authentication verification. Users are recommended to upgrade to version 5.6.1, which fixes this issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache httpclient
Vendors & Products Apache
Apache httpclient

Wed, 22 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description Missing critical step in authentication in Apache HttpClient 5.6 allows an attacker to cause the client to accept SCRAM-SHA-256 authentication without proper mutual authentication verification. Users are recommended to upgrade to version 5.6.1, which fixes this issue.
Title Apache HttpClient: SCRAM-SHA-256 mutual authentication bypass may cause the client to accept authentication without proper mutual authentication verification
Weaknesses CWE-304
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-22T14:15:54.885Z

Reserved: 2026-04-14T09:11:14.268Z

Link: CVE-2026-40542

cve-icon Vulnrichment

Updated: 2026-04-22T14:14:06.309Z

cve-icon NVD

Status : Received

Published: 2026-04-22T08:16:12.780

Modified: 2026-04-22T15:16:16.210

Link: CVE-2026-40542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T09:30:13Z

Weaknesses