Vulnerability Description
Quarkus OpenAPI Generator is Quarkus' extensions for generation of Rest Clients and server stubs generation. Prior to versions 2.11.1-lts, 2.16.0-lts, and 2.17.0, the generated authentication filter matches OpenAPI path templates too broadly when deciding whether to attach credentials. A security scheme configured for one operation can therefore be applied to a different same-method operation whose path only partially resembles the protected template, causing bearer tokens, API keys, or basic credentials to be sent to unintended endpoints. This issue has been patched in versions 2.11.1-lts, 2.16.0-lts, and 2.17.0.
Related Weaknesses (CWE)
References
- https://github.com/quarkiverse/quarkus-openapi-generator/pull/1586
- https://github.com/quarkiverse/quarkus-openapi-generator/releases/tag/2.11.1-lts
- https://github.com/quarkiverse/quarkus-openapi-generator/releases/tag/2.16.0-lts
- https://github.com/quarkiverse/quarkus-openapi-generator/releases/tag/2.17.0
- https://github.com/quarkiverse/quarkus-openapi-generator/security/advisories/GHS
- https://github.com/quarkiverse/quarkus-openapi-generator/security/advisories/GHS
FAQ
What is CVE-2026-42333?
CVE-2026-42333 is a documented vulnerability. Quarkus OpenAPI Generator is Quarkus' extensions for generation of Rest Clients and server stubs generation. Prior to versions 2.11.1-lts, 2.16.0-lts, and 2.17.0, the generated authentication filter m...
How severe is CVE-2026-42333?
CVSS scoring is not yet available for CVE-2026-42333. Check NVD for updates.
Is there a patch for CVE-2026-42333?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.