Critical severity9.1NVD Advisory· Published Apr 28, 2026· Updated Apr 30, 2026
CVE-2026-40976
CVE-2026-40976
Description
In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of its own and rely on the default web security filter chain; depend on spring-boot-actuator-autoconfigure; not depend on spring-boot-health. If any of the above does not apply, the application is not vulnerable.
Affected: Spring Boot 4.0.0–4.0.5; upgrade to 4.0.6 or later per vendor advisory.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework.boot:spring-bootMaven | >= 4.0.0, < 4.0.6 | 4.0.6 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-8v8j-3hxp-93wrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40976ghsaADVISORY
- spring.io/security/cve-2026-40976nvdVendor AdvisoryWEB
News mentions
0No linked articles in our index yet.