JustAppSec
Back to news

Jetty patches JASPI ThreadLocal auth context leak

2 min readPublished 08 Apr 2026Updated 08 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — A Jetty JASPI auth bug can leave per-request ThreadLocal state behind, letting a later request on the same thread inherit it and potentially gain unintended privileges.

What happened

Eclipse Jetty is a widely-embedded Java HTTP server and Servlet container used directly and as a transitive component in many Java stacks. CVE-2026-5795 describes a flaw in Jetty’s JASPIAuthenticator where authentication checks set two ThreadLocal variables, but some early-return paths fail to clear them. A subsequent request that reuses the same thread can inherit these values, resulting in broken access control and privilege escalation. (raw.githubusercontent.com)

ItemSource value
Affected component (per CVE)JASPIAuthenticator (JASPI authentication flow)
Impact (per CVE)Broken access control; privilege escalation via inherited ThreadLocal values
SeverityCVSS v3.1 7.4 (High)

Thread-/request-context confusion is a recurring failure mode in high-throughput servers: when “per-request” state accidentally becomes “per-thread,” auth guarantees can silently degrade under load and are hard to detect in typical unit/integration tests. (raw.githubusercontent.com)

Who is impacted

Jetty branch (per CVE record)Affected versions (per CVE record)
12.1.x12.1.0 through 12.1.7 (inclusive)
12.0.x12.0.0 through 12.0.33 (inclusive)
11.0.x11.0.0 through 11.0.28 (inclusive)
10.0.x10.0.0 through 10.0.28 (inclusive)
9.4.x9.4.0 through 9.4.60 (inclusive)
  • Higher-risk environments where request threads are reused heavily (typical in Jetty thread pools), because the vulnerability specifically depends on “a subsequent request using the same thread” inheriting leftover ThreadLocal state. (raw.githubusercontent.com)

What to do now

  • Follow vendor remediation guidance and apply the latest patched release available at the time of writing (the CVE record does not explicitly list fixed versions). (raw.githubusercontent.com)
  • Inventory where Jetty is present (direct dependency, shaded/embedded, app server bundle, container base image) and map running services to the affected version ranges.
  • Identify where JASPI / JASPIAuthenticator is in use; prioritize upgrades for internet-facing services and auth-gateway / SSO-adjacent services.
  • If you suspect exposure or anomalous auth behavior, review authentication and authorization logs for unexpected identity carry-over between requests (especially across different client sessions) and rotate credentials/tokens that would be high-impact if an elevated identity were incorrectly granted.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.