VYPR
High severity7.5NVD Advisory· Published Apr 28, 2026· Updated Apr 30, 2026

CVE-2026-40972

CVE-2026-40972

Description

An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading changed classes, thereby achieving remote code execution in the remote application.

Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); DevTools remote secret comparison. Versions that are no longer supported are also affected per vendor advisory.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.springframework.boot:spring-boot-devtoolsMaven
>= 4.0.0, < 4.0.64.0.6
org.springframework.boot:spring-boot-devtoolsMaven
>= 3.5.0, < 3.5.143.5.14
org.springframework.boot:spring-boot-devtoolsMaven
>= 3.4.0, <= 3.4.15
org.springframework.boot:spring-boot-devtoolsMaven
>= 3.3.0, <= 3.3.18
org.springframework.boot:spring-boot-devtoolsMaven
<= 2.7.32

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.