VYPR

Maven package

org.springframework/spring-webmvc

pkg:maven/org.springframework/spring-webmvc

Vulnerabilities (18)

  • CVE-2026-22745MedApr 29, 2026
    affected >= 7.0.0, < 7.0.7fixed 7.0.7

    Spring MVC and WebFlux applications are vulnerable to Denial of Service attacks when resolving static resources. More precisely, an application can be vulnerable when all the following are true: * the application is using Spring MVC or Spring WebFlux * the application is

  • CVE-2026-22741LowApr 29, 2026
    affected >= 7.0.0, < 7.0.7fixed 7.0.7

    Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources. More precisely, an application can be vulnerable when all the following are true: * the application is using Spring MVC or Spring WebFlux * the application is configuri

  • CVE-2026-22737MedMar 20, 2026
    affected >= 7.0.0-M1, < 7.0.6fixed 7.0.6

    Use of Java scripting engine enabled (e.g. JRuby, Jython) template views in Spring MVC and Spring WebFlux applications can result in disclosure of content from files outside the configured locations for script template views. This issue affects Spring Framework: from 7.0.0 throug

  • CVE-2026-22735LowMar 20, 2026
    affected >= 7.0.0-M1, < 7.0.6fixed 7.0.6

    Spring MVC and WebFlux applications are vulnerable to stream corruption when using Server-Sent Events (SSE). This issue affects Spring Foundation: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.

  • CVE-2025-41242MedAug 18, 2025
    affected >= 6.2.0, < 6.2.10fixed 6.2.10

    Spring Framework MVC applications can be vulnerable to a “Path Traversal Vulnerability” when deployed on a non-compliant Servlet container. An application can be vulnerable when all the following are true: * the application is deployed as a WAR or with an embedded Servlet co

  • CVE-2024-38819HigDec 19, 2024
    affected >= 6.1.0, < 6.1.14fixed 6.1.14

    Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the S

  • CVE-2024-38828MedNov 18, 2024
    affected >= 5.3.0, < 5.3.42fixed 5.3.42

    Spring MVC controller methods with an @RequestBody byte[] method parameter are vulnerable to a DoS attack.

  • CVE-2024-38816HigSep 13, 2024
    affected >= 6.1.0, < 6.1.13fixed 6.1.13

    Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the S

  • CVE-2023-34053Nov 28, 2023
    affected >= 6.0.0, < 6.0.14fixed 6.0.14

    In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring

  • CVE-2023-20860Mar 27, 2023
    affected >= 6.0.0, < 6.0.7fixed 6.0.7

    Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.

  • CVE-2022-22965KEVApr 1, 2022
    affected < 5.2.20.RELEASEfixed 5.2.20.RELEASE

    A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e.

  • CVE-2020-5397Jan 17, 2020
    affected >= 5.2.0, < 5.2.3fixed 5.2.3

    Spring Framework, versions 5.2.x prior to 5.2.3 are vulnerable to CSRF attacks through CORS preflight requests that target Spring MVC (spring-webmvc module) or Spring WebFlux (spring-webflux module) endpoints. Only non-authenticated endpoints are vulnerable because preflight requ

  • CVE-2020-5398Jan 16, 2020
    affected >= 5.2.0.RELEASE, < 5.2.3.RELEASEfixed 5.2.3.RELEASE

    In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute

  • CVE-2014-0225HigMay 25, 2017
    affected >= 4.0.0, < 4.0.5fixed 4.0.5

    When processing user provided XML documents, the Spring Framework 4.0.0 to 4.0.4, 3.0.0 to 3.2.8, and possibly earlier unsupported versions did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack.

  • CVE-2016-9878HigDec 29, 2016
    affected < 3.2.18fixed 3.2.18

    An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks.

  • CVE-2014-3625Nov 20, 2014
    affected >= 3.0.4, < 3.2.12fixed 3.2.12

    Directory traversal vulnerability in Pivotal Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling.

  • CVE-2014-0054Apr 17, 2014
    affected < 3.2.8fixed 3.2.8

    The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML,

  • CVE-2014-1904Mar 20, 2014
    affected >= 3.0.0, < 3.2.8.RELEASEfixed 3.2.8.RELEASE

    Cross-site scripting (XSS) vulnerability in web/servlet/tags/form/FormTag.java in Spring MVC in Spring Framework 3.0.0 before 3.2.8 and 4.0.0 before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the requested URI in a default action.