Low severity3.7NVD Advisory· Published Apr 22, 2026· Updated Apr 24, 2026
CVE-2026-22746
CVE-2026-22746
Description
Vulnerability in Spring Spring Security. If an application is using the UserDetails#isEnabled, #isAccountNonExpired, or #isAccountNonLocked user attributes, to enable, expire, or lock users, then DaoAuthenticationProvider's timing attack defense can be bypassed for users who are disabled, expired, or locked.This issue affects Spring Security: from 5.7.0 through 5.7.22, from 5.8.0 through 5.8.24, from 6.3.0 through 6.3.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework.security:spring-security-coreMaven | >= 5.7.0, <= 5.7.22 | — |
org.springframework.security:spring-security-coreMaven | >= 5.8.0, <= 5.8.24 | — |
org.springframework.security:spring-security-coreMaven | >= 6.3.0, <= 6.3.15 | — |
org.springframework.security:spring-security-coreMaven | >= 6.4.0, <= 6.4.15 | — |
org.springframework.security:spring-security-coreMaven | >= 6.5.0, < 6.5.10 | 6.5.10 |
org.springframework.security:spring-security-coreMaven | >= 7.0.0, < 7.0.5 | 7.0.5 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-vxf7-qj7q-83fhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-22746ghsaADVISORY
- spring.io/security/cve-2026-22746nvdVendor AdvisoryWEB
News mentions
0No linked articles in our index yet.