Medium severity4.7NVD Advisory· Published Apr 28, 2026· Updated Apr 30, 2026
CVE-2026-40977
CVE-2026-40977
Description
When an application is configured to use ApplicationPidFileWriter, a local attacker with write access to the PID file's location can corrupt one file on the host each time the application is started.
Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); PID file / symlink behavior (ApplicationPidFileWriter). Versions that are no longer supported are also affected per vendor advisory.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework.boot:spring-boot-cassandraMaven | >= 4.0.0, < 4.0.6 | 4.0.6 |
org.springframework.boot:spring-boot-cassandraMaven | >= 3.5.0, < 3.5.14 | 3.5.14 |
org.springframework.boot:spring-boot-cassandraMaven | >= 3.4.0, <= 3.4.15 | — |
org.springframework.boot:spring-boot-cassandraMaven | >= 3.3.0, <= 3.3.18 | — |
org.springframework.boot:spring-boot-cassandraMaven | <= 2.7.32 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-5368-6h4h-gr29ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40977ghsaADVISORY
- spring.io/security/cve-2026-40977nvdVendor AdvisoryWEB
News mentions
0No linked articles in our index yet.