Quarkus is a Java framework for building cloud-native applications. In versions prior to 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2, a path normalization inconsistency between the security layer and the routing layer allows unauthenticated or lower-privileged users to bypass HTTP path-based authorization policies. Quarkus's security layer performs authorization checks on the raw URL path which preserves matrix parameters (semicolons), while RESTEasy Reactive's routing layer strips matrix parameters before matching endpoints. An attacker can append a semicolon and arbitrary text to a request URL (e.g., /api/admin;anything) to bypass policies protecting /api/admin while still routing to the protected endpoint. This issue has been fixed in versions 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2.

Project Subscriptions

Vendors Products
Apache Camel Quarkus Subscribe
Quarkus Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rc95-pcm8-65v9 Quarkus has Authentication/Authorization bypasses
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 06 May 2026 00:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat apache Camel Quarkus
Redhat quarkus
Weaknesses CWE-551
CPEs cpe:/a:redhat:apache_camel_quarkus:3.27
cpe:/a:redhat:quarkus:3.20::el8
cpe:/a:redhat:quarkus:3.27::el8
Vendors & Products Redhat
Redhat apache Camel Quarkus
Redhat quarkus
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}

threat_severity

Important


Tue, 05 May 2026 21:15:00 +0000

Type Values Removed Values Added
Description Quarkus is a Java framework for building cloud-native applications. In versions prior to 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2, a path normalization inconsistency between the security layer and the routing layer allows unauthenticated or lower-privileged users to bypass HTTP path-based authorization policies. Quarkus's security layer performs authorization checks on the raw URL path which preserves matrix parameters (semicolons), while RESTEasy Reactive's routing layer strips matrix parameters before matching endpoints. An attacker can append a semicolon and arbitrary text to a request URL (e.g., /api/admin;anything) to bypass policies protecting /api/admin while still routing to the protected endpoint. This issue has been fixed in versions 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2.
Title Quarkus authorization bypass via semicolon path normalization inconsistency
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-05T20:58:29.575Z

Reserved: 2026-04-07T19:13:20.378Z

Link: CVE-2026-39852

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T21:16:22.823

Modified: 2026-05-05T21:16:22.823

Link: CVE-2026-39852

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-04T00:00:00Z

Links: CVE-2026-39852 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T22:30:33Z

Weaknesses