VYPR
Medium severity4.7NVD Advisory· Published Apr 28, 2026· Updated Apr 30, 2026

CVE-2026-40977

CVE-2026-40977

Description

When an application is configured to use ApplicationPidFileWriter, a local attacker with write access to the PID file's location can corrupt one file on the host each time the application is started.

Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); PID file / symlink behavior (ApplicationPidFileWriter). Versions that are no longer supported are also affected per vendor advisory.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.springframework.boot:spring-boot-cassandraMaven
>= 4.0.0, < 4.0.64.0.6
org.springframework.boot:spring-boot-cassandraMaven
>= 3.5.0, < 3.5.143.5.14
org.springframework.boot:spring-boot-cassandraMaven
>= 3.4.0, <= 3.4.15
org.springframework.boot:spring-boot-cassandraMaven
>= 3.3.0, <= 3.3.18
org.springframework.boot:spring-boot-cassandraMaven
<= 2.7.32

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.