CVE-2026-22746Observable Timing Discrepancy in Spring Security

Severity
3.7LOWNVD
EPSS
0.1%
top 83.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22

Description

Vulnerability in Spring Spring Security. If an application is using the UserDetails#isEnabled, #isAccountNonExpired, or #isAccountNonLocked user attributes, to enable, expire, or lock users, then DaoAuthenticationProvider's timing attack defense can be bypassed for users who are disabled, expired, or locked.This issue affects Spring Security: from 5.7.0 through 5.7.22, from 5.8.0 through 5.8.24, from 6.3.0 through 6.3.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 2.2 | Impact: 1.4

Affected Packages6 packages

🔴Vulnerability Details

1
GHSA
GHSA-vxf7-qj7q-83fh: Vulnerability in Spring Spring Security2026-04-22

📋Vendor Advisories

1
Red Hat
Spring Security: Spring Security: Timing attack defense bypass allows information disclosure2026-04-22

💬Community

1
Bugzilla
CVE-2026-22746 Spring Security: Spring Security: Timing attack defense bypass allows information disclosure2026-04-22