Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.springframework/spring-webmvc@6.1.21
Typemaven
Namespaceorg.springframework
Namespring-webmvc
Version6.1.21
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.2.10
Latest_non_vulnerable_version7.0.6
Affected_by_vulnerabilities
0
url VCID-85dj-ems3-vyh4
vulnerability_id VCID-85dj-ems3-vyh4
summary
Spring MVC and WebFlux has Server Sent Event stream corruption
Spring MVC and WebFlux applications are vulnerable to stream corruption when using Server-Sent Events (SSE). This issue affects Spring Foundation: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22735.json
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22735.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22735
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07278
published_at 2026-04-18T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07284
published_at 2026-04-16T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07353
published_at 2026-04-13T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07366
published_at 2026-04-12T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07379
published_at 2026-04-11T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07384
published_at 2026-04-09T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07273
published_at 2026-04-02T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07356
published_at 2026-04-08T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.073
published_at 2026-04-07T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07317
published_at 2026-04-04T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08684
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22735
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22735
3
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-22735
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-22735
5
reference_url https://spring.io/security/cve-2026-22735
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-20T14:44:28Z/
url https://spring.io/security/cve-2026-22735
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2449347
reference_id 2449347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2449347
7
reference_url https://github.com/advisories/GHSA-6hcq-hmm3-jj3c
reference_id GHSA-6hcq-hmm3-jj3c
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6hcq-hmm3-jj3c
fixed_packages
0
url pkg:maven/org.springframework/spring-webmvc@6.2.17
purl pkg:maven/org.springframework/spring-webmvc@6.2.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@6.2.17
1
url pkg:maven/org.springframework/spring-webmvc@7.0.6
purl pkg:maven/org.springframework/spring-webmvc@7.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@7.0.6
aliases CVE-2026-22735, GHSA-6hcq-hmm3-jj3c
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85dj-ems3-vyh4
1
url VCID-n1vf-acj7-gkaf
vulnerability_id VCID-n1vf-acj7-gkaf
summary
Spring Framework MVC Applications Path Traversal Vulnerability
Spring Framework MVC applications can be vulnerable to a “Path Traversal Vulnerability” when deployed on a non-compliant Servlet container.

An application can be vulnerable when all the following are true:

  *  the application is deployed as a WAR or with an embedded Servlet container
  *  the Servlet container  does not reject suspicious sequences https://jakarta.ee/specifications/servlet/6.1/jakarta-servlet-spec-6.1.html#uri-path-canonicalization 
  *  the application  serves static resources https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-config/static-resources.html#page-title  with Spring resource handling


We have verified that applications deployed on Apache Tomcat or Eclipse Jetty are not vulnerable, as long as default security features are not disabled in the configuration. Because we cannot check exploits against all Servlet containers and configuration variants, we strongly recommend upgrading your application.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-41242.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-41242.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-41242
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.2199
published_at 2026-04-21T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22036
published_at 2026-04-18T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22043
published_at 2026-04-16T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22045
published_at 2026-04-13T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22105
published_at 2026-04-12T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22156
published_at 2026-04-02T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22145
published_at 2026-04-11T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22206
published_at 2026-04-04T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.22127
published_at 2026-04-09T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.22071
published_at 2026-04-08T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21991
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-41242
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41242
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41242
3
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-41242
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-41242
5
reference_url http://spring.io/security/cve-2025-41242
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-18T11:20:32Z/
url http://spring.io/security/cve-2025-41242
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2389113
reference_id 2389113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2389113
7
reference_url https://github.com/advisories/GHSA-r936-gwx5-v52f
reference_id GHSA-r936-gwx5-v52f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r936-gwx5-v52f
fixed_packages
0
url pkg:maven/org.springframework/spring-webmvc@6.2.10
purl pkg:maven/org.springframework/spring-webmvc@6.2.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@6.2.10
aliases CVE-2025-41242, GHSA-r936-gwx5-v52f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n1vf-acj7-gkaf
2
url VCID-sh22-dem5-aqf3
vulnerability_id VCID-sh22-dem5-aqf3
summary
Spring Framework Improper Path Limitation with Script View Templates
Use of Java scripting engine enabled (e.g. JRuby, Jython) template views in Spring MVC and Spring WebFlux applications can result in disclosure of content from files outside the configured locations for script template views. This issue affects Spring Framework: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22737.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22737
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19485
published_at 2026-04-18T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19477
published_at 2026-04-16T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19511
published_at 2026-04-13T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.1957
published_at 2026-04-12T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19618
published_at 2026-04-11T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19614
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19709
published_at 2026-04-02T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19561
published_at 2026-04-08T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19482
published_at 2026-04-07T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19758
published_at 2026-04-04T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.2106
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22737
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22737
3
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-22737
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-22737
5
reference_url https://spring.io/security/cve-2026-22737
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-20T14:43:36Z/
url https://spring.io/security/cve-2026-22737
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2449348
reference_id 2449348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2449348
7
reference_url https://github.com/advisories/GHSA-4773-3jfm-qmx3
reference_id GHSA-4773-3jfm-qmx3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4773-3jfm-qmx3
fixed_packages
0
url pkg:maven/org.springframework/spring-webmvc@6.2.17
purl pkg:maven/org.springframework/spring-webmvc@6.2.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@6.2.17
1
url pkg:maven/org.springframework/spring-webmvc@7.0.6
purl pkg:maven/org.springframework/spring-webmvc@7.0.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@7.0.6
aliases CVE-2026-22737, GHSA-4773-3jfm-qmx3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh22-dem5-aqf3
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@6.1.21