CVE-2026-40972
Description
An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading changed classes, thereby achieving remote code execution in the remote application.
Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); DevTools remote secret comparison. Versions that are no longer supported are also affected per vendor advisory.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework.boot:spring-boot-devtoolsMaven | >= 4.0.0, < 4.0.6 | 4.0.6 |
org.springframework.boot:spring-boot-devtoolsMaven | >= 3.5.0, < 3.5.14 | 3.5.14 |
org.springframework.boot:spring-boot-devtoolsMaven | >= 3.4.0, <= 3.4.15 | — |
org.springframework.boot:spring-boot-devtoolsMaven | >= 3.3.0, <= 3.3.18 | — |
org.springframework.boot:spring-boot-devtoolsMaven | <= 2.7.32 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-56v8-86gj-66jpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40972ghsaADVISORY
- spring.io/security/cve-2026-40972nvdVendor AdvisoryWEB
News mentions
0No linked articles in our index yet.