Skip to content

spring-boot-starter-web-4.0.4.jar: 11 vulnerabilities (highest severity is: 9.1) #53

@mend-bolt-for-github

Description

@mend-bolt-for-github
Vulnerable Library - spring-boot-starter-web-4.0.4.jar

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (spring-boot-starter-web version) Remediation Possible**
CVE-2026-29145 Critical 9.1 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-34487 High 7.5 tomcat-embed-core-11.0.18.jar Transitive N/A*
CVE-2026-34483 High 7.5 tomcat-embed-core-11.0.18.jar Transitive N/A*
CVE-2026-29146 High 7.5 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-29129 High 7.5 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-24880 High 7.5 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-34500 Medium 6.5 tomcat-embed-core-11.0.18.jar Transitive N/A*
CVE-2026-22740 Medium 6.5 spring-web-7.0.6.jar Transitive N/A*
CVE-2026-25854 Medium 6.1 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-32990 Medium 5.3 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-22741 Low 3.1 spring-webmvc-7.0.6.jar Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2026-29145

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.
Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-29145

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-34487

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-34487

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:11.0.21,org.apache.tomcat:tomcat-tribes:11.0.21,org.apache.tomcat.embed:tomcat-embed-core:10.1.54,https://github.com/apache/tomcat.git - 10.1.54,org.apache.tomcat:tomcat-tribes:9.0.117,https://github.com/apache/tomcat.git - 11.0.21,https://github.com/apache/tomcat.git - 9.0.117,org.apache.tomcat:tomcat-tribes:10.1.54,org.apache.tomcat.embed:tomcat-embed-core:9.0.117

Step up your Open Source Security Game with Mend here

CVE-2026-34483

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-34483

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution: org.apache.tomcat:tomcat-catalina:10.1.54,org.apache.tomcat.embed:tomcat-embed-core:9.0.117,org.apache.tomcat:tomcat-catalina:11.0.21,org.apache.tomcat:tomcat-catalina:9.0.117,org.apache.tomcat.embed:tomcat-embed-core:11.0.21,https://github.com/apache/tomcat.git - 11.0.21,org.apache.tomcat.embed:tomcat-embed-core:10.1.54,https://github.com/apache/tomcat.git - 10.1.54,https://github.com/apache/tomcat.git - 9.0.117

Step up your Open Source Security Game with Mend here

CVE-2026-29146

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.
Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.

Publish Date: 2026-04-09

URL: CVE-2026-29146

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.19

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-29129

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

Configured cipher preference order not preserved vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-29129

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-24880

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.
Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-24880

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-34500

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.

Publish Date: 2026-04-09

URL: CVE-2026-34500

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution: org.apache.tomcat:tomcat-coyote:10.1.54,org.apache.tomcat:tomcat-coyote:9.0.117,org.apache.tomcat.embed:tomcat-embed-core:11.0.21,org.apache.tomcat.embed:tomcat-embed-core:9.0.117,org.apache.tomcat:tomcat-coyote:11.0.21,https://github.com/apache/tomcat.git - 9.0.117,https://github.com/apache/tomcat.git - 11.0.21,org.apache.tomcat.embed:tomcat-embed-core:10.1.54,https://github.com/apache/tomcat.git - 10.1.54

Step up your Open Source Security Game with Mend here

CVE-2026-22740

Vulnerable Library - spring-web-7.0.6.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/7.0.6/2baeb353efd42374239cc45e8d02780d6c6e7a77/spring-web-7.0.6.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-http-converter-4.0.4.jar
      • spring-web-7.0.6.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space.

Publish Date: 2026-04-18

URL: CVE-2026-22740

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://spring.io/security/cve-2026-22740

Release Date: 2026-04-18

Fix Resolution: org.springframework:spring-web:6.2.18,https://github.com/spring-projects/spring-framework.git - v7.0.7,org.springframework:spring-web:7.0.7,https://github.com/spring-projects/spring-framework.git - v6.2.18

Step up your Open Source Security Game with Mend here

CVE-2026-25854

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-25854

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-32990

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.
This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-32990

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-22741

Vulnerable Library - spring-webmvc-7.0.6.jar

Spring Web MVC

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-webmvc/7.0.6/da516a887d0fea326c16b07fb2519f7f112f8eda/spring-webmvc-7.0.6.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-webmvc-4.0.4.jar
      • spring-webmvc-7.0.6.jar (Vulnerable Library)

Found in HEAD commit: 29e5aeedb20278d4c2d9ff41b8322b5115b86941

Found in base branch: master

Vulnerability Details

Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources.

More precisely, an application can be vulnerable when all the following are true:

the application is using Spring MVC or Spring WebFlux
the application is configuring the resource chain support with caching enabled
the application adds support for encoded resources resolution
the resource cache must be empty when the attacker has access to the application
When all the conditions above are met, the attacker can send malicious requests and poison the resource cache with resources using the wrong encoding. This can cause a denial of service by breaking the front-end application for clients.

Publish Date: 2026-04-18

URL: CVE-2026-22741

CVSS 3 Score Details (3.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://spring.io/security/cve-2026-22741

Release Date: 2026-04-18

Fix Resolution: org.springframework:spring-webmvc:7.0.7,org.springframework:spring-webmvc:6.2.18,https://github.com/spring-projects/spring-framework.git - v7.0.7,org.springframework:spring-webflux:6.2.18,org.springframework:spring-webflux:7.0.7,https://github.com/spring-projects/spring-framework.git - v6.2.18

Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions