CVE-2026-22751Time-of-check Time-of-use (TOCTOU) Race Condition in Spring Security

Severity
4.8MEDIUMNVD
EPSS
0.0%
top 90.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 21

Description

Vulnerability in Spring Spring Security. Applications that explicitly configure One-Time Token login with JdbcOneTimeTokenService are vulnerable to a Time-of-check Time-of-use (TOCTOU) race condition. This issue affects Spring Security: from 6.4.0 through 6.4.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 2.2 | Impact: 2.5

Affected Packages6 packages

🔴Vulnerability Details

2
VulDB
Vmware Spring Security up to 6.4.15/6.5.9/7.0.4 One-Time Token Login toctou (EUVD-2026-24227)2026-04-21
GHSA
GHSA-x2wq-9x2f-fhj7: Vulnerability in Spring Spring Security2026-04-21

📋Vendor Advisories

1
Red Hat
Spring Security: JdbcOneTimeTokenService: Spring Security: Authentication bypass due to race condition in One-Time Token login2026-04-21

💬Community

1
Bugzilla
CVE-2026-22751 Spring Security: JdbcOneTimeTokenService: Spring Security: Authentication bypass due to race condition in One-Time Token login2026-04-21