Vulnerable Library - spring-boot-starter-web-4.0.4.jar
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Vulnerabilities
| Vulnerability |
Severity |
CVSS |
Dependency |
Type |
Fixed in (spring-boot-starter-web version) |
Remediation Possible** |
| CVE-2026-29145 |
Critical |
9.1 |
tomcat-embed-core-11.0.18.jar |
Transitive |
4.0.5 |
❌ |
| CVE-2026-34487 |
High |
7.5 |
tomcat-embed-core-11.0.18.jar |
Transitive |
N/A* |
❌ |
| CVE-2026-34483 |
High |
7.5 |
tomcat-embed-core-11.0.18.jar |
Transitive |
N/A* |
❌ |
| CVE-2026-29146 |
High |
7.5 |
tomcat-embed-core-11.0.18.jar |
Transitive |
4.0.5 |
❌ |
| CVE-2026-29129 |
High |
7.5 |
tomcat-embed-core-11.0.18.jar |
Transitive |
4.0.5 |
❌ |
| CVE-2026-24880 |
High |
7.5 |
tomcat-embed-core-11.0.18.jar |
Transitive |
4.0.5 |
❌ |
| CVE-2026-34500 |
Medium |
6.5 |
tomcat-embed-core-11.0.18.jar |
Transitive |
N/A* |
❌ |
| CVE-2026-22740 |
Medium |
6.5 |
spring-web-7.0.6.jar |
Transitive |
N/A* |
❌ |
| CVE-2026-25854 |
Medium |
6.1 |
tomcat-embed-core-11.0.18.jar |
Transitive |
4.0.5 |
❌ |
| CVE-2026-32990 |
Medium |
5.3 |
tomcat-embed-core-11.0.18.jar |
Transitive |
4.0.5 |
❌ |
| CVE-2026-22741 |
Low |
3.1 |
spring-webmvc-7.0.6.jar |
Transitive |
N/A* |
❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2026-29145
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-starter-tomcat-4.0.4.jar
- spring-boot-starter-tomcat-runtime-4.0.4.jar
- ❌ tomcat-embed-core-11.0.18.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.
Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29145
CVSS 3 Score Details (9.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
CVE-2026-34487
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-starter-tomcat-4.0.4.jar
- spring-boot-starter-tomcat-runtime-4.0.4.jar
- ❌ tomcat-embed-core-11.0.18.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34487
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:11.0.21,org.apache.tomcat:tomcat-tribes:11.0.21,org.apache.tomcat.embed:tomcat-embed-core:10.1.54,https://github.com/apache/tomcat.git - 10.1.54,org.apache.tomcat:tomcat-tribes:9.0.117,https://github.com/apache/tomcat.git - 11.0.21,https://github.com/apache/tomcat.git - 9.0.117,org.apache.tomcat:tomcat-tribes:10.1.54,org.apache.tomcat.embed:tomcat-embed-core:9.0.117
Step up your Open Source Security Game with Mend here
CVE-2026-34483
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-starter-tomcat-4.0.4.jar
- spring-boot-starter-tomcat-runtime-4.0.4.jar
- ❌ tomcat-embed-core-11.0.18.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34483
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution: org.apache.tomcat:tomcat-catalina:10.1.54,org.apache.tomcat.embed:tomcat-embed-core:9.0.117,org.apache.tomcat:tomcat-catalina:11.0.21,org.apache.tomcat:tomcat-catalina:9.0.117,org.apache.tomcat.embed:tomcat-embed-core:11.0.21,https://github.com/apache/tomcat.git - 11.0.21,org.apache.tomcat.embed:tomcat-embed-core:10.1.54,https://github.com/apache/tomcat.git - 10.1.54,https://github.com/apache/tomcat.git - 9.0.117
Step up your Open Source Security Game with Mend here
CVE-2026-29146
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-starter-tomcat-4.0.4.jar
- spring-boot-starter-tomcat-runtime-4.0.4.jar
- ❌ tomcat-embed-core-11.0.18.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.
Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29146
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.19
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
CVE-2026-29129
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-starter-tomcat-4.0.4.jar
- spring-boot-starter-tomcat-runtime-4.0.4.jar
- ❌ tomcat-embed-core-11.0.18.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Configured cipher preference order not preserved vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29129
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
CVE-2026-24880
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-starter-tomcat-4.0.4.jar
- spring-boot-starter-tomcat-runtime-4.0.4.jar
- ❌ tomcat-embed-core-11.0.18.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.
Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-24880
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
CVE-2026-34500
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-starter-tomcat-4.0.4.jar
- spring-boot-starter-tomcat-runtime-4.0.4.jar
- ❌ tomcat-embed-core-11.0.18.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34500
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution: org.apache.tomcat:tomcat-coyote:10.1.54,org.apache.tomcat:tomcat-coyote:9.0.117,org.apache.tomcat.embed:tomcat-embed-core:11.0.21,org.apache.tomcat.embed:tomcat-embed-core:9.0.117,org.apache.tomcat:tomcat-coyote:11.0.21,https://github.com/apache/tomcat.git - 9.0.117,https://github.com/apache/tomcat.git - 11.0.21,org.apache.tomcat.embed:tomcat-embed-core:10.1.54,https://github.com/apache/tomcat.git - 10.1.54
Step up your Open Source Security Game with Mend here
CVE-2026-22740
Vulnerable Library - spring-web-7.0.6.jar
Spring Web
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/7.0.6/2baeb353efd42374239cc45e8d02780d6c6e7a77/spring-web-7.0.6.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-http-converter-4.0.4.jar
- ❌ spring-web-7.0.6.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space.
Publish Date: 2026-04-18
URL: CVE-2026-22740
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22740
Release Date: 2026-04-18
Fix Resolution: org.springframework:spring-web:6.2.18,https://github.com/spring-projects/spring-framework.git - v7.0.7,org.springframework:spring-web:7.0.7,https://github.com/spring-projects/spring-framework.git - v6.2.18
Step up your Open Source Security Game with Mend here
CVE-2026-25854
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-starter-tomcat-4.0.4.jar
- spring-boot-starter-tomcat-runtime-4.0.4.jar
- ❌ tomcat-embed-core-11.0.18.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-25854
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
CVE-2026-32990
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-starter-tomcat-4.0.4.jar
- spring-boot-starter-tomcat-runtime-4.0.4.jar
- ❌ tomcat-embed-core-11.0.18.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.
This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-32990
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
CVE-2026-22741
Vulnerable Library - spring-webmvc-7.0.6.jar
Spring Web MVC
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-webmvc/7.0.6/da516a887d0fea326c16b07fb2519f7f112f8eda/spring-webmvc-7.0.6.jar
Dependency Hierarchy:
- spring-boot-starter-web-4.0.4.jar (Root Library)
- spring-boot-webmvc-4.0.4.jar
- ❌ spring-webmvc-7.0.6.jar (Vulnerable Library)
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources.
More precisely, an application can be vulnerable when all the following are true:
the application is using Spring MVC or Spring WebFlux
the application is configuring the resource chain support with caching enabled
the application adds support for encoded resources resolution
the resource cache must be empty when the attacker has access to the application
When all the conditions above are met, the attacker can send malicious requests and poison the resource cache with resources using the wrong encoding. This can cause a denial of service by breaking the front-end application for clients.
Publish Date: 2026-04-18
URL: CVE-2026-22741
CVSS 3 Score Details (3.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22741
Release Date: 2026-04-18
Fix Resolution: org.springframework:spring-webmvc:7.0.7,org.springframework:spring-webmvc:6.2.18,https://github.com/spring-projects/spring-framework.git - v7.0.7,org.springframework:spring-webflux:6.2.18,org.springframework:spring-webflux:7.0.7,https://github.com/spring-projects/spring-framework.git - v6.2.18
Step up your Open Source Security Game with Mend here
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.
Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29145
CVSS 3 Score Details (9.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34487
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:11.0.21,org.apache.tomcat:tomcat-tribes:11.0.21,org.apache.tomcat.embed:tomcat-embed-core:10.1.54,https://github.com/apache/tomcat.git - 10.1.54,org.apache.tomcat:tomcat-tribes:9.0.117,https://github.com/apache/tomcat.git - 11.0.21,https://github.com/apache/tomcat.git - 9.0.117,org.apache.tomcat:tomcat-tribes:10.1.54,org.apache.tomcat.embed:tomcat-embed-core:9.0.117
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34483
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution: org.apache.tomcat:tomcat-catalina:10.1.54,org.apache.tomcat.embed:tomcat-embed-core:9.0.117,org.apache.tomcat:tomcat-catalina:11.0.21,org.apache.tomcat:tomcat-catalina:9.0.117,org.apache.tomcat.embed:tomcat-embed-core:11.0.21,https://github.com/apache/tomcat.git - 11.0.21,org.apache.tomcat.embed:tomcat-embed-core:10.1.54,https://github.com/apache/tomcat.git - 10.1.54,https://github.com/apache/tomcat.git - 9.0.117
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.
Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29146
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.19
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Configured cipher preference order not preserved vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29129
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.
Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-24880
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34500
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution: org.apache.tomcat:tomcat-coyote:10.1.54,org.apache.tomcat:tomcat-coyote:9.0.117,org.apache.tomcat.embed:tomcat-embed-core:11.0.21,org.apache.tomcat.embed:tomcat-embed-core:9.0.117,org.apache.tomcat:tomcat-coyote:11.0.21,https://github.com/apache/tomcat.git - 9.0.117,https://github.com/apache/tomcat.git - 11.0.21,org.apache.tomcat.embed:tomcat-embed-core:10.1.54,https://github.com/apache/tomcat.git - 10.1.54
Step up your Open Source Security Game with Mend here
Vulnerable Library - spring-web-7.0.6.jar
Spring Web
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/7.0.6/2baeb353efd42374239cc45e8d02780d6c6e7a77/spring-web-7.0.6.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space.
Publish Date: 2026-04-18
URL: CVE-2026-22740
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22740
Release Date: 2026-04-18
Fix Resolution: org.springframework:spring-web:6.2.18,https://github.com/spring-projects/spring-framework.git - v7.0.7,org.springframework:spring-web:7.0.7,https://github.com/spring-projects/spring-framework.git - v6.2.18
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-25854
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-11.0.18.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.
This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-32990
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5
Step up your Open Source Security Game with Mend here
Vulnerable Library - spring-webmvc-7.0.6.jar
Spring Web MVC
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-webmvc/7.0.6/da516a887d0fea326c16b07fb2519f7f112f8eda/spring-webmvc-7.0.6.jar
Dependency Hierarchy:
Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941
Found in base branch: master
Vulnerability Details
Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources.
More precisely, an application can be vulnerable when all the following are true:
the application is using Spring MVC or Spring WebFlux
the application is configuring the resource chain support with caching enabled
the application adds support for encoded resources resolution
the resource cache must be empty when the attacker has access to the application
When all the conditions above are met, the attacker can send malicious requests and poison the resource cache with resources using the wrong encoding. This can cause a denial of service by breaking the front-end application for clients.
Publish Date: 2026-04-18
URL: CVE-2026-22741
CVSS 3 Score Details (3.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22741
Release Date: 2026-04-18
Fix Resolution: org.springframework:spring-webmvc:7.0.7,org.springframework:spring-webmvc:6.2.18,https://github.com/spring-projects/spring-framework.git - v7.0.7,org.springframework:spring-webflux:6.2.18,org.springframework:spring-webflux:7.0.7,https://github.com/spring-projects/spring-framework.git - v6.2.18
Step up your Open Source Security Game with Mend here