7
CVE-2026-40973
- EPSS 0.02%
- Veröffentlicht 27.04.2026 23:29:51
- Zuletzt bearbeitet 30.04.2026 14:25:36
- Quelle security@vmware.com
- CVE-Watchlists
- Unerledigt
A local attacker on the same host as the application may be able to take control of the directory used by `ApplicationTemp`. When `server.servlet.session.persistent` is set to `true` and the attack persists across application restarts, this may allow the attacker to read session information and hijack authenticated users or deploy a gadget chain and execute code as the application's user. Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); predictable temp directory / `ApplicationTemp` ownership verification. Versions that are no longer supported are also affected per vendor advisory.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VMware ≫ Spring Boot Version < 2.7.33
VMware ≫ Spring Boot Version >= 3.3.0 < 3.3.19
VMware ≫ Spring Boot Version >= 3.4.0 < 3.4.16
VMware ≫ Spring Boot Version >= 3.5.0 < 3.5.14
VMware ≫ Spring Boot Version >= 4.0.0 < 4.0.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.038 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@vmware.com | 7 | 1 | 5.9 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-377 Insecure Temporary File
Creating and using insecure temporary files can leave application and system data vulnerable to attack.