Medium severity4.8NVD Advisory· Published Apr 28, 2026· Updated Apr 30, 2026
CVE-2026-40975
CVE-2026-40975
Description
Values produced by ${random.value} are not suitable for use as secrets. ${random.uuid} is not affected. ${random.int} and ${random.long} should never be used for secrets as they are numeric values with a predictable range.
Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); random value property source / weak PRNG for secrets. Versions that are no longer supported are also affected per vendor advisory.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework.boot:spring-boot-cassandraMaven | >= 4.0.0, < 4.0.6 | 4.0.6 |
org.springframework.boot:spring-boot-cassandraMaven | >= 3.5.0, < 3.5.14 | 3.5.14 |
org.springframework.boot:spring-boot-cassandraMaven | >= 3.4.0, <= 3.4.15 | — |
org.springframework.boot:spring-boot-cassandraMaven | >= 3.3.0, <= 3.3.18 | — |
org.springframework.boot:spring-boot-cassandraMaven | <= 2.7.32 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-m4x9-hx6x-2c43ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40975ghsaADVISORY
- spring.io/security/cve-2026-40975nvdVendor AdvisoryWEB
News mentions
0No linked articles in our index yet.