High severity7.5GHSA Advisory· Published Oct 16, 2025· Updated Apr 15, 2026
CVE-2025-41253
CVE-2025-41253
Description
The following versions of Spring Cloud Gateway Server Webflux may be vulnerable to the ability to expose environment variables and system properties to attackers.
An application should be considered vulnerable when all the following are true:
- The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable).
- An admin or untrusted third party using Spring Expression Language (SpEL) to access environment variables or system properties via routes.
- An untrusted third party could create a route that uses SpEL to access environment variables or system properties if: * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway and management.endpoint.gateway.enabled=trueor management.endpoint.gateway.access=unrestricte.
- The actuator endpoints are available to attackers.
- The actuator endpoints are unsecured.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework.cloud:spring-cloud-gateway-serverMaven | >= 4.3.0, < 4.3.2 | 4.3.2 |
org.springframework.cloud:spring-cloud-gateway-serverMaven | >= 4.2.0, < 4.2.6 | 4.2.6 |
org.springframework.cloud:spring-cloud-gateway-serverMaven | >= 4.0.0, <= 4.1.9 | — |
org.springframework.cloud:spring-cloud-gateway-serverMaven | <= 3.1.10 | — |
Affected products
1- Range: <= 3.1.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.