Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-rpc4-u4aq-4qde
Vulnerability ID VCID-rpc4-u4aq-4qde
Aliases CVE-2023-41900
GHSA-pwh8-58vv-vw48
Summary Jetty's OpenId Revoked authentication allows one request If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated. So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`.
Status Published
Exploitability 0.5
Weighted Severity 3.1
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 3.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41900.json
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-41900
cvssv3.1 3.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr LOW https://github.com/advisories/GHSA-pwh8-58vv-vw48
cvssv3.1 3.5 https://github.com/eclipse/jetty.project
generic_textual LOW https://github.com/eclipse/jetty.project
cvssv3.1 3.5 https://github.com/eclipse/jetty.project/pull/9528
generic_textual LOW https://github.com/eclipse/jetty.project/pull/9528
ssvc Track https://github.com/eclipse/jetty.project/pull/9528
cvssv3.1 3.5 https://github.com/eclipse/jetty.project/pull/9660
generic_textual LOW https://github.com/eclipse/jetty.project/pull/9660
ssvc Track https://github.com/eclipse/jetty.project/pull/9660
cvssv3.1 3.5 https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
cvssv3.1_qr LOW https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
generic_textual LOW https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
ssvc Track https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
cvssv3.1 3.5 https://nvd.nist.gov/vuln/detail/CVE-2023-41900
generic_textual LOW https://nvd.nist.gov/vuln/detail/CVE-2023-41900
cvssv3.1 3.5 https://security.netapp.com/advisory/ntap-20231110-0004
generic_textual LOW https://security.netapp.com/advisory/ntap-20231110-0004
cvssv3.1 3.5 https://security.netapp.com/advisory/ntap-20231110-0004/
ssvc Track https://security.netapp.com/advisory/ntap-20231110-0004/
cvssv3.1 3.5 https://www.debian.org/security/2023/dsa-5507
generic_textual LOW https://www.debian.org/security/2023/dsa-5507
ssvc Track https://www.debian.org/security/2023/dsa-5507
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41900.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://github.com/eclipse/jetty.project
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://github.com/eclipse/jetty.project/pull/9528
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/ Found at https://github.com/eclipse/jetty.project/pull/9528
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://github.com/eclipse/jetty.project/pull/9660
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/ Found at https://github.com/eclipse/jetty.project/pull/9660
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/ Found at https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-41900
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20231110-0004
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20231110-0004/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/ Found at https://security.netapp.com/advisory/ntap-20231110-0004/
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://www.debian.org/security/2023/dsa-5507
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/ Found at https://www.debian.org/security/2023/dsa-5507
Exploit Prediction Scoring System (EPSS)
Percentile 0.32789
EPSS Score 0.00131
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:51:49.358492+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.eclipse.jetty/jetty-openid/CVE-2023-41900.yml 38.0.0