Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-40490
Published:April 18, 2026
Updated:April 23, 2026
The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When redirect following is enabled (followRedirect(true)), versions of AsyncHttpClient prior to 3.0.9 and 2.14.5 forward Authorization and Proxy-Authorization headers along with Realm credentials to arbitrary redirect targets regardless of domain, scheme, or port changes. This leaks credentials on cross-domain redirects and HTTPS-to-HTTP downgrades. Additionally, even when stripAuthorizationOnRedirect is set to true, the Realm object containing plaintext credentials is still propagated to the redirect request, causing credential re-generation for Basic and Digest authentication schemes via NettyRequestFactory. An attacker who controls a redirect target (via open redirect, DNS rebinding, or MITM on HTTP) can capture Bearer tokens, Basic auth credentials, or any other Authorization header value. The fix in versions 3.0.9 and 2.14.5 automatically strips Authorization and Proxy-Authorization headers and clears Realm credentials whenever a redirect crosses origin boundaries (different scheme, host, or port) or downgrades from HTTPS to HTTP. For users unable to upgrade, set "(stripAuthorizationOnRedirect(true))" in the client config and avoid using Realm-based authentication with redirect following enabled. Note that "(stripAuthorizationOnRedirect(true))" alone is insufficient on versions prior to 3.0.9 and 2.14.5 because the Realm bypass still re-generates credentials. Alternatively, disable redirect following ("followRedirect(false)") and handle redirects manually with origin validation.
Affected Packages
https://github.com/AsyncHttpClient/async-http-client.git (GITHUB):
Affected version(s) >=async-http-client-project-2.0.0 <async-http-client-project-2.14.5
Fix Suggestion:
Update to version async-http-client-project-2.14.5
https://github.com/AsyncHttpClient/async-http-client.git (GITHUB):
Affected version(s) >=async-http-client-project-3.0.0 <async-http-client-project-3.0.9
Fix Suggestion:
Update to version async-http-client-project-3.0.9
org.asynchttpclient:async-http-client (JAVA):
Affected version(s) >=2.0.0 <2.14.5
Fix Suggestion:
Update to version 2.14.5
org.asynchttpclient:async-http-client (JAVA):
Affected version(s) >=2.0.0-alpha13 <3.0.9
Fix Suggestion:
Update to version 3.0.9
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.9
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.8
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Exposure of Sensitive Information to an Unauthorized Actor
EPSS
Base Score:
0.06