Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.springframework.security/spring-security-web@5.6.0
Typemaven
Namespaceorg.springframework.security
Namespring-security-web
Version5.6.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.5.9
Latest_non_vulnerable_version7.0.4
Affected_by_vulnerabilities
0
url VCID-r15d-pzfc-3fg7
vulnerability_id VCID-r15d-pzfc-3fg7
summary
Spring Security authorization rules can be bypassed via forward or include dispatcher types
Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies security to forward and include dispatcher types. The application uses the AuthorizationFilter either manually or via the authorizeHttpRequests() method. The application configures the FilterChainProxy to apply to forward and/or include requests (e.g. spring.security.filter.dispatcher-types = request, error, async, forward, include). The application may forward or include the request to a higher privilege-secured endpoint.The application configures Spring Security to apply to every dispatcher type via authorizeHttpRequests().shouldFilterAllDispatcherTypes(true)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31692.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31692
reference_id
reference_type
scores
0
value 0.08385
scoring_system epss
scoring_elements 0.92325
published_at 2026-04-18T12:55:00Z
1
value 0.08385
scoring_system epss
scoring_elements 0.92326
published_at 2026-04-21T12:55:00Z
2
value 0.08385
scoring_system epss
scoring_elements 0.92313
published_at 2026-04-13T12:55:00Z
3
value 0.08385
scoring_system epss
scoring_elements 0.92315
published_at 2026-04-12T12:55:00Z
4
value 0.08385
scoring_system epss
scoring_elements 0.92314
published_at 2026-04-11T12:55:00Z
5
value 0.08385
scoring_system epss
scoring_elements 0.92308
published_at 2026-04-09T12:55:00Z
6
value 0.08385
scoring_system epss
scoring_elements 0.92293
published_at 2026-04-07T12:55:00Z
7
value 0.08385
scoring_system epss
scoring_elements 0.92304
published_at 2026-04-08T12:55:00Z
8
value 0.08385
scoring_system epss
scoring_elements 0.9229
published_at 2026-04-04T12:55:00Z
9
value 0.08385
scoring_system epss
scoring_elements 0.92284
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31692
2
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31692
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31692
4
reference_url https://security.netapp.com/advisory/ntap-20221215-0010
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20221215-0010
5
reference_url https://security.netapp.com/advisory/ntap-20221215-0010/
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-06T15:52:10Z/
url https://security.netapp.com/advisory/ntap-20221215-0010/
6
reference_url https://tanzu.vmware.com/security/cve-2022-31692
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-06T15:52:10Z/
url https://tanzu.vmware.com/security/cve-2022-31692
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162206
reference_id 2162206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162206
8
reference_url https://github.com/advisories/GHSA-mmmh-wcxm-2wr4
reference_id GHSA-mmmh-wcxm-2wr4
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mmmh-wcxm-2wr4
9
reference_url https://access.redhat.com/errata/RHSA-2023:1655
reference_id RHSA-2023:1655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1655
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-web@5.6.9
purl pkg:maven/org.springframework.security/spring-security-web@5.6.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.6.9
1
url pkg:maven/org.springframework.security/spring-security-web@5.7.5
purl pkg:maven/org.springframework.security/spring-security-web@5.7.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9tg6-2h2y-abah
1
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.7.5
aliases CVE-2022-31692, GHSA-mmmh-wcxm-2wr4
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r15d-pzfc-3fg7
1
url VCID-suxb-vrqh-wffp
vulnerability_id VCID-suxb-vrqh-wffp
summary
Authorization bypass in Spring Security
In Spring Security versions 5.5.6 and 5.5.7 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22978.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22978.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22978
reference_id
reference_type
scores
0
value 0.90406
scoring_system epss
scoring_elements 0.99603
published_at 2026-04-02T12:55:00Z
1
value 0.90406
scoring_system epss
scoring_elements 0.99607
published_at 2026-04-16T12:55:00Z
2
value 0.90406
scoring_system epss
scoring_elements 0.99606
published_at 2026-04-13T12:55:00Z
3
value 0.90406
scoring_system epss
scoring_elements 0.99605
published_at 2026-04-07T12:55:00Z
4
value 0.90406
scoring_system epss
scoring_elements 0.99604
published_at 2026-04-04T12:55:00Z
5
value 0.9071
scoring_system epss
scoring_elements 0.99622
published_at 2026-04-18T12:55:00Z
6
value 0.9071
scoring_system epss
scoring_elements 0.99625
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22978
2
reference_url https://github.com/anchore/grype/issues/2158
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/anchore/grype/issues/2158
3
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
4
reference_url https://github.com/spring-projects/spring-security/blob/main/web/src/main/java/org/springframework/security/web/util/matcher/RegexRequestMatcher.java
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security/blob/main/web/src/main/java/org/springframework/security/web/util/matcher/RegexRequestMatcher.java
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-22978
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-22978
6
reference_url https://security.netapp.com/advisory/ntap-20220707-0003
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220707-0003
7
reference_url https://spring.io/security/cve-2022-22978
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://spring.io/security/cve-2022-22978
8
reference_url https://tanzu.vmware.com/security/cve-2022-22978
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://tanzu.vmware.com/security/cve-2022-22978
9
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2087606
reference_id 2087606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2087606
11
reference_url https://github.com/advisories/GHSA-hh32-7344-cg2f
reference_id GHSA-hh32-7344-cg2f
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hh32-7344-cg2f
12
reference_url https://access.redhat.com/errata/RHSA-2022:5532
reference_id RHSA-2022:5532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5532
13
reference_url https://access.redhat.com/errata/RHSA-2023:3299
reference_id RHSA-2023:3299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3299
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-web@5.6.4
purl pkg:maven/org.springframework.security/spring-security-web@5.6.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r15d-pzfc-3fg7
1
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.6.4
aliases CVE-2022-22978, GHSA-hh32-7344-cg2f
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-suxb-vrqh-wffp
2
url VCID-vfqt-vr9q-2kfp
vulnerability_id VCID-vfqt-vr9q-2kfp
summary
Spring Security HTTP Headers Are not Written Under Some Conditions
When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22732.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22732
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04091
published_at 2026-04-18T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04083
published_at 2026-04-16T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04129
published_at 2026-04-13T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04155
published_at 2026-04-12T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04173
published_at 2026-04-11T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04194
published_at 2026-04-09T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04113
published_at 2026-04-02T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04179
published_at 2026-04-08T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04147
published_at 2026-04-07T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04132
published_at 2026-04-04T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05445
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22732
2
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-22732
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-22732
4
reference_url https://spring.io/security/cve-2026-22732
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-20T15:01:06Z/
url https://spring.io/security/cve-2026-22732
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2449306
reference_id 2449306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2449306
6
reference_url https://github.com/advisories/GHSA-mf92-479x-3373
reference_id GHSA-mf92-479x-3373
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mf92-479x-3373
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-web@6.5.9
purl pkg:maven/org.springframework.security/spring-security-web@6.5.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@6.5.9
1
url pkg:maven/org.springframework.security/spring-security-web@7.0.4
purl pkg:maven/org.springframework.security/spring-security-web@7.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@7.0.4
aliases CVE-2026-22732, GHSA-mf92-479x-3373
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfqt-vr9q-2kfp
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.6.0