Vmware Spring Security vulnerabilities
24 known vulnerabilities affecting vmware/spring_security.
Total CVEs
24
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL5HIGH11MEDIUM8
Vulnerabilities
Page 1 of 2
CVE-2026-22732CRITICALCVSS 9.1≥ 5.7.0, ≤ 5.7.21≥ 5.8.0, ≤ 5.8.23+4 more2026-03-19
CVE-2026-22732 [CRITICAL] CWE-425 CVE-2026-22732: When applications specify HTTP response headers for servlet applications using Spring Security, ther
When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written.
This issue affects Spring Security Servlet applications using lazy (default) writing of HTTP Headers:
: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14,
cvelistv5nvd
CVE-2025-41248HIGHCVSS 7.5≥ 6.4.x, < 6.4.11≥ 6.5.x, < 6.5.52025-09-16
CVE-2025-41248 [HIGH] CVE-2025-41248: Spring Security authorization bypass for method security annotations on parameterized types
CVE-2025-41248: Spring Security authorization bypass for method security annotations on parameterized types
The Spring Security annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue when using @PreAuthorize and other method security annotati
cvelistv5
CVE-2024-38810HIGHCVSS 7.5≥ 6.3.0, < 6.3.22024-08-20
CVE-2024-38810 [MEDIUM] CWE-287 CVE-2024-38810: Missing Authorization When Using @AuthorizeReturnObject in Spring Security 6.3.0 and 6.3.1 allows at
Missing Authorization When Using @AuthorizeReturnObject in Spring Security 6.3.0 and 6.3.1 allows attacker to render security annotations inaffective.
nvd
CVE-2024-22234HIGHCVSS 7.4≥ 6.1.0, < 6.1.7≥ 6.2.0, < 6.2.22024-02-20
CVE-2024-22234 [HIGH] CWE-284 CVE-2024-22234: In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.
Specifically, an application is vulnerable if:
* The application uses AuthenticationTrustResolver.isFullyAuthentic
nvd
CVE-2023-34042MEDIUMCVSS 5.5≥ 5.8.4, < 5.8.7≥ 6.0.4, < 6.0.7+3 more2024-02-05
CVE-2023-34042 [MEDIUM] CWE-732 CVE-2023-34042: The spring-security.xsd file inside the
spring-security-config jar is world writable which means th
The spring-security.xsd file inside the
spring-security-config jar is world writable which means that if it were
extracted it could be written by anyone with access to the file system.
While there are no known exploits, this is an example of “CWE-732:
Incorrect Permission Assignment for Critical Resource” and could result
in an exploit. Users shou
nvd
CVE-2023-34034CRITICALCVSS 9.8≥ 5.6.0, < 5.6.12≥ 5.7.0, < 5.7.10+3 more2023-07-19
CVE-2023-34034 [CRITICAL] CWE-281 CVE-2023-34034: Using "**" as a pattern in Spring Security configuration
for WebFlux creates a mismatch in pattern
Using "**" as a pattern in Spring Security configuration
for WebFlux creates a mismatch in pattern matching between Spring
Security and Spring WebFlux, and the potential for a security bypass.
nvd
CVE-2023-34035MEDIUMCVSS 5.3≥ 5.8.0, < 5.8.5≥ 6.0.0, < 6.0.5+1 more2023-07-18
CVE-2023-34035 [HIGH] CWE-863 CVE-2023-34035: Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be sus
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on
nvd
CVE-2023-20862MEDIUMCVSS 6.3≥ 5.7.0, < 5.7.8≥ 5.8.0, < 5.8.3+1 more2023-04-19
CVE-2023-20862 [MEDIUM] CWE-459 CVE-2023-20862: In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x
In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerabilit
nvd
CVE-2022-31692CRITICALCVSS 9.8≥ 5.6.0, < 5.6.9≥ 5.7.0, < 5.7.52022-10-31
CVE-2022-31692 [CRITICAL] CWE-639 CVE-2022-31692: Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authoriz
Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies security to forward and include dispatcher types. The app
nvd
CVE-2022-31690HIGHCVSS 8.1≥ 5.6.0, < 5.6.9≥ 5.7.0, < 5.7.52022-10-31
CVE-2022-31690 [HIGH] CVE-2022-31690: Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions
Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privilege escalation on the subsequent approval
nvd
CVE-2022-22978CRITICALCVSS 9.8fixed in 5.5.7≥ 5.6.0, < 5.6.42022-05-19
CVE-2022-22978 [CRITICAL] CWE-863 CVE-2022-22978: In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexR
In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
nvd
CVE-2022-22976MEDIUMCVSS 5.3≥ 5.2.1, < 5.5.7≥ 5.6.0, < 5.6.4+1 more2022-05-19
CVE-2022-22976 [MEDIUM] CWE-190 CVE-2022-22976: Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported version
Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE.
nvd
CVE-2021-22119HIGHCVSS 7.5≥ 5.2.0, < 5.2.11≥ 5.3.0, < 5.3.10+2 more2021-06-29
CVE-2021-22119 [HIGH] CWE-400 CVE-2021-22119: Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization
nvd
CVE-2021-22112HIGHCVSS 8.8≥ 5.4.0, < 5.4.42021-02-23
CVE-2021-22112 [HIGH] CVE-2021-22112: Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, an
Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to r
nvd
CVE-2020-5408MEDIUMCVSS 6.5≥ 4.2.0, < 4.2.16≥ 5.0.0, < 5.0.16+1 more2020-05-14
CVE-2020-5408 [MEDIUM] CWE-329 CVE-2020-5408: Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x pr
Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to d
nvd
CVE-2019-11272HIGHCVSS 7.3fixed in 4.2.132019-06-26
CVE-2019-11272 [HIGH] CWE-287 CVE-2019-11272: Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text pass
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null
nvd
CVE-2019-3795MEDIUMCVSS 5.3≥ 4.2.0, < 4.2.12≥ 5.0.0, < 5.0.12+1 more2019-04-09
CVE-2019-3795 [MEDIUM] CWE-330 CVE-2019-3795: Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 cont
Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an honest application must provide a seed and make the resulting random material available to an attacker
nvd
CVE-2018-1199MEDIUMCVSS 5.3≥ 4.1.0, < 4.1.5≥ 4.2.0, < 4.2.4+1 more2018-03-16
CVE-2018-1199 [MEDIUM] CWE-20 CVE-2018-1199: Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The
nvd
CVE-2017-4995HIGHCVSS 8.1v4.2.0v4.2.1+2 more2017-11-27
CVE-2017-4995 [HIGH] CWE-502 CVE-2017-4995: An issue was discovered in Pivotal Spring Security 4.2.0.RELEASE through 4.2.2.RELEASE, and Spring S
An issue was discovered in Pivotal Spring Security 4.2.0.RELEASE through 4.2.2.RELEASE, and Spring Security 5.0.0.M1. When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets." Spring Security co
nvd
CVE-2014-3527CRITICALCVSS 9.8v3.1.0v3.1.1+8 more2017-05-25
CVE-2014-3527 [CRITICAL] CWE-287 CVE-2014-3527: When using the CAS Proxy ticket authentication from Spring Security 3.1 to 3.2.4 a malicious CAS Ser
When using the CAS Proxy ticket authentication from Spring Security 3.1 to 3.2.4 a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. This is due to the fact that the proxy ticket authentication uses the information from the HttpServletRequest which is populated based upon untrusted info
nvd
1 / 2Next →