CVE-2026-22751 — Time-of-check Time-of-use (TOCTOU) Race Condition in Spring Security
Severity
4.8MEDIUMNVD
EPSS
0.0%
top 90.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 21
Description
Vulnerability in Spring Spring Security. Applications that explicitly configure One-Time Token login with JdbcOneTimeTokenService are vulnerable to a Time-of-check Time-of-use (TOCTOU) race condition. This issue affects Spring Security: from 6.4.0 through 6.4.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 2.2 | Impact: 2.5
Affected Packages6 packages
🔴Vulnerability Details
2📋Vendor Advisories
1Red Hat▶
Spring Security: JdbcOneTimeTokenService: Spring Security: Authentication bypass due to race condition in One-Time Token login↗2026-04-21
💬Community
1Bugzilla▶
CVE-2026-22751 Spring Security: JdbcOneTimeTokenService: Spring Security: Authentication bypass due to race condition in One-Time Token login↗2026-04-21