Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2024-38819 — Path Traversal in Vmware Spring Framework
Severity
7.5HIGHNVD
EPSS
92.9%
top 0.23%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 19
Latest updateOct 15
Description
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages1 packages
🔴Vulnerability Details
4💥Exploits & PoCs
1Nuclei▶
Spring Framework Path Traversal in Functional Web Frameworks
📋Vendor Advisories
6Oracle▶
Oracle Oracle Enterprise Manager Risk Matrix: Infrastructure Management (Spring Framework) — CVE-2024-38819↗2025-10-15
Oracle
▶
Oracle▶
Oracle Oracle Commerce Risk Matrix: Content Acquisition System (Spring Framework) — CVE-2024-38819↗2025-04-15
Oracle
▶
Red Hat▶
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks↗2024-10-17