logo

CVE-2025-22235 org.springframework.boot:spring-boot

Package

Manager: maven
Name: org.springframework.boot:spring-boot
Vulnerable Version: >=0 <=2.7.24.2 || >=3.1.0 <=3.1.15.2 || >=3.2.0 <=3.2.13.2 || >=3.3.0 <3.3.11 || >=3.4.0 <3.4.5

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00106 pctl0.29408

Details

Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed. Your application may be affected by this if all the following conditions are met: * You use Spring Security * EndpointRequest.to() has been used in a Spring Security chain configuration * The endpoint which EndpointRequest references is disabled or not exposed via web * Your application handles requests to /null and this path needs protection You are not affected if any of the following is true: * You don't use Spring Security * You don't use EndpointRequest.to() * The endpoint which EndpointRequest.to() refers to is enabled and is exposed * Your application does not handle requests to /null or this path does not need protection

Metadata

Created: 2025-04-28T09:31:53Z
Modified: 2025-05-17T00:30:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-rc42-6c7j-7h5r/GHSA-rc42-6c7j-7h5r.json
CWE IDs: ["CWE-20", "CWE-862"]
Alternative ID: GHSA-rc42-6c7j-7h5r
Finding: F039
Auto approve: 1