quarkus-openapi-generator has overly broad path-parameter matching that sends authentication headers to unintended operations — CVE-2026-42333
GitHub · GitHub · CVE-2026-42333
ID
CVE-2026-42333
CVE-2026-42333
Date
Updated
Activity
Source
GitHub
GitHub
Vendor
GitHub
GitHub
Threat
medium
medium
CVSS
6.3
6.3
EPSS
0.00085
0.00085
Summary
### Summary The generated authentication filter matches OpenAPI path templates too broadly when deciding whether to attach credentials. A security scheme configured for one operation can therefore be applied to a different same-method operation whose path only partially resembles the protected template, causing bearer tokens, API keys, or basic credentials to be sent to unintended endpoints. ### Details The runtime…
Product
maven: io.quarkiverse.openapi.generator:quarkus-openapi-generator
What to do
General, cautious steps (verify details in the official source):
- Review exposure and plan remediation based on risk and environment.
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.