VYPR
High severity7.5GHSA Advisory· Published Oct 16, 2025· Updated Apr 15, 2026

CVE-2025-41253

CVE-2025-41253

Description

The following versions of Spring Cloud Gateway Server Webflux may be vulnerable to the ability to expose environment variables and system properties to attackers.

An application should be considered vulnerable when all the following are true:

  • The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable).
  • An admin or untrusted third party using Spring Expression Language (SpEL) to access environment variables or system properties via routes.
  • An untrusted third party could create a route that uses SpEL to access environment variables or system properties if: * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway and management.endpoint.gateway.enabled=trueor management.endpoint.gateway.access=unrestricte.
  • The actuator endpoints are available to attackers.
  • The actuator endpoints are unsecured.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.springframework.cloud:spring-cloud-gateway-serverMaven
>= 4.3.0, < 4.3.24.3.2
org.springframework.cloud:spring-cloud-gateway-serverMaven
>= 4.2.0, < 4.2.64.2.6
org.springframework.cloud:spring-cloud-gateway-serverMaven
>= 4.0.0, <= 4.1.9
org.springframework.cloud:spring-cloud-gateway-serverMaven
<= 3.1.10

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.