Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.springframework/spring-core@6.1.3 |
| Type | maven |
| Namespace | org.springframework |
| Name | spring-core |
| Version | 6.1.3 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 6.2.11 |
| Latest_non_vulnerable_version | 6.2.11 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-k2en-h5n1-r7gr |
| vulnerability_id |
VCID-k2en-h5n1-r7gr |
| summary |
Spring Framework annotation detection mechanism may result in improper authorization
The Spring Framework annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue if such annotations are used for authorization decisions.
Your application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature.
You are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces.
This CVE is published in conjunction with CVE-2025-41248 https://spring.io/security/cve-2025-41248 . |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-41249 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20101 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20085 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20027 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19947 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20221 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20162 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22057 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22125 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22065 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22064 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-41249 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://spring.io/security/cve-2025-41249 |
| reference_id |
CVE-2025-41249 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T19:29:22Z/ |
|
|
| url |
https://spring.io/security/cve-2025-41249 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-41249, GHSA-jmp9-x22r-554x
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k2en-h5n1-r7gr |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-s7s7-tzq3-m3bc |
| vulnerability_id |
VCID-s7s7-tzq3-m3bc |
| summary |
Spring Framework server Web DoS Vulnerability
In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable when all of the following are true:
* the application uses Spring MVC
* Spring Security 6.1.6+ or 6.2.1+ is on the classpath
Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-22233 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01539 |
| scoring_system |
epss |
| scoring_elements |
0.81398 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01539 |
| scoring_system |
epss |
| scoring_elements |
0.8136 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01539 |
| scoring_system |
epss |
| scoring_elements |
0.81368 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01539 |
| scoring_system |
epss |
| scoring_elements |
0.81383 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01539 |
| scoring_system |
epss |
| scoring_elements |
0.81362 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01539 |
| scoring_system |
epss |
| scoring_elements |
0.81329 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01539 |
| scoring_system |
epss |
| scoring_elements |
0.81307 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01539 |
| scoring_system |
epss |
| scoring_elements |
0.81357 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01539 |
| scoring_system |
epss |
| scoring_elements |
0.81328 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-22233 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-22233, GHSA-r4q3-7g4q-x89m
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s7s7-tzq3-m3bc |
|
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@6.1.3 |