CVE-2025-41248
- EPSS 0.05%
- Veröffentlicht 16.09.2025 10:10:59
- Zuletzt bearbeitet 16.09.2025 20:15:35
The Spring Security annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue when using @PreAuthorize and other method securi...
CVE-2024-38827
- EPSS 0.14%
- Veröffentlicht 02.12.2024 15:15:11
- Zuletzt bearbeitet 24.01.2025 20:15:32
The usage of String.toLowerCase() and String.toUpperCase() has some Locale dependent exceptions that could potentially result in authorization rules not working properly.
CVE-2024-38810
- EPSS 0.67%
- Veröffentlicht 20.08.2024 04:15:07
- Zuletzt bearbeitet 28.02.2025 22:37:56
Missing Authorization When Using @AuthorizeReturnObject in Spring Security 6.3.0 and 6.3.1 allows attacker to render security annotations inaffective.
CVE-2024-22234
- EPSS 1.64%
- Veröffentlicht 20.02.2024 07:15:09
- Zuletzt bearbeitet 02.04.2025 20:10:31
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method. Specificall...
CVE-2023-34042
- EPSS 0.04%
- Veröffentlicht 05.02.2024 22:15:55
- Zuletzt bearbeitet 03.06.2025 19:15:32
The spring-security.xsd file inside the spring-security-config jar is world writable which means that if it were extracted it could be written by anyone with access to the file system. While there are no known exploits, this is an example of “CWE...
CVE-2023-34034
- EPSS 51.02%
- Veröffentlicht 19.07.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 08:06:26
Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.
CVE-2023-34035
- EPSS 2.18%
- Veröffentlicht 18.07.2023 16:15:11
- Zuletzt bearbeitet 21.11.2024 08:06:26
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s ...
CVE-2023-20862
- EPSS 0.37%
- Veröffentlicht 19.04.2023 20:15:10
- Zuletzt bearbeitet 05.02.2025 16:15:33
In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to exp...
CVE-2022-31692
- EPSS 7.64%
- Veröffentlicht 31.10.2022 20:15:12
- Zuletzt bearbeitet 06.05.2025 16:15:23
Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The applica...
CVE-2022-31690
- EPSS 0.21%
- Veröffentlicht 31.10.2022 20:15:12
- Zuletzt bearbeitet 08.05.2025 19:15:52
Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (v...