Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.springframework.security/spring-security-web@5.7.7
Typemaven
Namespaceorg.springframework.security
Namespring-security-web
Version5.7.7
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.5.9
Latest_non_vulnerable_version7.0.4
Affected_by_vulnerabilities
0
url VCID-9tg6-2h2y-abah
vulnerability_id VCID-9tg6-2h2y-abah
summary
Incomplete Cleanup
In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerability can keep users authenticated even after they performed logout. Users of affected versions should apply the following mitigation. 5.7.x users should upgrade to 5.7.8. 5.8.x users should upgrade to 5.8.3. 6.0.x users should upgrade to 6.0.3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20862.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-20862
reference_id
reference_type
scores
0
value 0.00397
scoring_system epss
scoring_elements 0.60522
published_at 2026-04-21T12:55:00Z
1
value 0.00397
scoring_system epss
scoring_elements 0.60533
published_at 2026-04-18T12:55:00Z
2
value 0.00397
scoring_system epss
scoring_elements 0.60525
published_at 2026-04-16T12:55:00Z
3
value 0.00397
scoring_system epss
scoring_elements 0.60483
published_at 2026-04-13T12:55:00Z
4
value 0.00397
scoring_system epss
scoring_elements 0.60504
published_at 2026-04-12T12:55:00Z
5
value 0.00397
scoring_system epss
scoring_elements 0.60517
published_at 2026-04-11T12:55:00Z
6
value 0.00397
scoring_system epss
scoring_elements 0.60432
published_at 2026-04-07T12:55:00Z
7
value 0.00397
scoring_system epss
scoring_elements 0.60481
published_at 2026-04-08T12:55:00Z
8
value 0.00397
scoring_system epss
scoring_elements 0.60464
published_at 2026-04-04T12:55:00Z
9
value 0.00397
scoring_system epss
scoring_elements 0.60437
published_at 2026-04-02T12:55:00Z
10
value 0.00397
scoring_system epss
scoring_elements 0.60497
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-20862
2
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
3
reference_url https://security.netapp.com/advisory/ntap-20230526-0002
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230526-0002
4
reference_url https://security.netapp.com/advisory/ntap-20230526-0002/
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:45:51Z/
url https://security.netapp.com/advisory/ntap-20230526-0002/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2227788
reference_id 2227788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2227788
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-20862
reference_id CVE-2023-20862
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-20862
7
reference_url https://spring.io/security/cve-2023-20862
reference_id CVE-2023-20862
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:45:51Z/
url https://spring.io/security/cve-2023-20862
8
reference_url https://github.com/advisories/GHSA-x873-6rgc-94jc
reference_id GHSA-x873-6rgc-94jc
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x873-6rgc-94jc
9
reference_url https://access.redhat.com/errata/RHSA-2024:0778
reference_id RHSA-2024:0778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0778
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-web@5.7.8
purl pkg:maven/org.springframework.security/spring-security-web@5.7.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.7.8
1
url pkg:maven/org.springframework.security/spring-security-web@5.8.3
purl pkg:maven/org.springframework.security/spring-security-web@5.8.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.8.3
2
url pkg:maven/org.springframework.security/spring-security-web@6.0.3
purl pkg:maven/org.springframework.security/spring-security-web@6.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@6.0.3
aliases CVE-2023-20862, GHSA-x873-6rgc-94jc
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tg6-2h2y-abah
1
url VCID-vfqt-vr9q-2kfp
vulnerability_id VCID-vfqt-vr9q-2kfp
summary
Spring Security HTTP Headers Are not Written Under Some Conditions
When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22732.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22732
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04091
published_at 2026-04-18T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04083
published_at 2026-04-16T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04129
published_at 2026-04-13T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04155
published_at 2026-04-12T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04173
published_at 2026-04-11T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04194
published_at 2026-04-09T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04113
published_at 2026-04-02T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04179
published_at 2026-04-08T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04147
published_at 2026-04-07T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04132
published_at 2026-04-04T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05445
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22732
2
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-22732
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-22732
4
reference_url https://spring.io/security/cve-2026-22732
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-03-20T15:01:06Z/
url https://spring.io/security/cve-2026-22732
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2449306
reference_id 2449306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2449306
6
reference_url https://github.com/advisories/GHSA-mf92-479x-3373
reference_id GHSA-mf92-479x-3373
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mf92-479x-3373
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-web@6.5.9
purl pkg:maven/org.springframework.security/spring-security-web@6.5.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@6.5.9
1
url pkg:maven/org.springframework.security/spring-security-web@7.0.4
purl pkg:maven/org.springframework.security/spring-security-web@7.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@7.0.4
aliases CVE-2026-22732, GHSA-mf92-479x-3373
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfqt-vr9q-2kfp
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.7.7