Quarkus is a Java framework for building cloud-native applications. In versions prior to 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2, a path normalization inconsistency between the security layer and the routing layer allows unauthenticated or lower-privileged users to bypass HTTP path-based authorization policies. Quarkus's security layer performs authorization checks on the raw URL path which preserves matrix parameters (semicolons), while RESTEasy Reactive's routing layer strips matrix parameters before matching endpoints. An attacker can append a semicolon and arbitrary text to a request URL (e.g., /api/admin;anything) to bypass policies protecting /api/admin while still routing to the protected endpoint. This issue has been fixed in versions 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2.
Project Subscriptions
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rc95-pcm8-65v9 | Quarkus has Authentication/Authorization bypasses |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 06 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat apache Camel Quarkus Redhat quarkus |
|
| Weaknesses | CWE-551 | |
| CPEs | cpe:/a:redhat:apache_camel_quarkus:3.27 cpe:/a:redhat:quarkus:3.20::el8 cpe:/a:redhat:quarkus:3.27::el8 |
|
| Vendors & Products |
Redhat
Redhat apache Camel Quarkus Redhat quarkus |
|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 05 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Quarkus is a Java framework for building cloud-native applications. In versions prior to 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2, a path normalization inconsistency between the security layer and the routing layer allows unauthenticated or lower-privileged users to bypass HTTP path-based authorization policies. Quarkus's security layer performs authorization checks on the raw URL path which preserves matrix parameters (semicolons), while RESTEasy Reactive's routing layer strips matrix parameters before matching endpoints. An attacker can append a semicolon and arbitrary text to a request URL (e.g., /api/admin;anything) to bypass policies protecting /api/admin while still routing to the protected endpoint. This issue has been fixed in versions 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2. | |
| Title | Quarkus authorization bypass via semicolon path normalization inconsistency | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-05T20:58:29.575Z
Reserved: 2026-04-07T19:13:20.378Z
Link: CVE-2026-39852
No data.
Status : Received
Published: 2026-05-05T21:16:22.823
Modified: 2026-05-05T21:16:22.823
Link: CVE-2026-39852
OpenCVE Enrichment
Updated: 2026-05-05T22:30:33Z
Github GHSA