Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.springframework.security/spring-security-core@6.1.2
Typemaven
Namespaceorg.springframework.security
Namespring-security-core
Version6.1.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.2.8
Latest_non_vulnerable_version6.5.4
Affected_by_vulnerabilities
0
url VCID-42hz-39hx-myh7
vulnerability_id VCID-42hz-39hx-myh7
summary
Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated
In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method.

Specifically, an application is vulnerable if:

  *  The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value.


An application is not vulnerable if any of the following is true:

  *  The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly.
  *  The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated
  *  The application only uses isFullyAuthenticated via  Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html  or  HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22234.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22234.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22234
reference_id
reference_type
scores
0
value 0.01656
scoring_system epss
scoring_elements 0.8208
published_at 2026-04-21T12:55:00Z
1
value 0.01656
scoring_system epss
scoring_elements 0.81989
published_at 2026-04-02T12:55:00Z
2
value 0.01656
scoring_system epss
scoring_elements 0.82061
published_at 2026-04-11T12:55:00Z
3
value 0.01656
scoring_system epss
scoring_elements 0.82042
published_at 2026-04-09T12:55:00Z
4
value 0.01656
scoring_system epss
scoring_elements 0.82035
published_at 2026-04-08T12:55:00Z
5
value 0.01656
scoring_system epss
scoring_elements 0.82008
published_at 2026-04-07T12:55:00Z
6
value 0.01656
scoring_system epss
scoring_elements 0.82012
published_at 2026-04-04T12:55:00Z
7
value 0.01656
scoring_system epss
scoring_elements 0.82079
published_at 2026-04-18T12:55:00Z
8
value 0.01656
scoring_system epss
scoring_elements 0.82043
published_at 2026-04-13T12:55:00Z
9
value 0.01656
scoring_system epss
scoring_elements 0.82051
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22234
2
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
3
reference_url https://github.com/spring-projects/spring-security/commit/750cb30ce44d279c2f54c845d375e6a58bded569
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security/commit/750cb30ce44d279c2f54c845d375e6a58bded569
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-22234
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-22234
5
reference_url https://security.netapp.com/advisory/ntap-20240315-0003
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240315-0003
6
reference_url https://spring.io/security/cve-2024-22234
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T19:46:52Z/
url https://spring.io/security/cve-2024-22234
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2265172
reference_id 2265172
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2265172
8
reference_url https://github.com/advisories/GHSA-w3w6-26f2-p474
reference_id GHSA-w3w6-26f2-p474
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w3w6-26f2-p474
9
reference_url https://security.netapp.com/advisory/ntap-20240315-0003/
reference_id ntap-20240315-0003
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T19:46:52Z/
url https://security.netapp.com/advisory/ntap-20240315-0003/
10
reference_url https://access.redhat.com/errata/RHSA-2024:3550
reference_id RHSA-2024:3550
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3550
11
reference_url https://access.redhat.com/errata/RHSA-2024:6667
reference_id RHSA-2024:6667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6667
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-core@6.1.7
purl pkg:maven/org.springframework.security/spring-security-core@6.1.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwcq-d6nf-1ubn
1
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.1.7
1
url pkg:maven/org.springframework.security/spring-security-core@6.2.2
purl pkg:maven/org.springframework.security/spring-security-core@6.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwcq-d6nf-1ubn
1
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.2.2
aliases CVE-2024-22234, GHSA-w3w6-26f2-p474
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42hz-39hx-myh7
1
url VCID-dwcq-d6nf-1ubn
vulnerability_id VCID-dwcq-d6nf-1ubn
summary
Erroneous authentication pass in Spring Security
In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to 5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, versions 6.2.x prior to 6.2.3, an application is possible vulnerable to broken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter.

Specifically, an application is vulnerable if:

The application uses AuthenticatedVoter directly and a null authentication parameter is passed to it resulting in an erroneous true return value.

An application is not vulnerable if any of the following is true:

* The application does not use AuthenticatedVoter#vote directly.
* The application does not pass null to AuthenticatedVoter#vote.

Note that AuthenticatedVoter is deprecated since 5.8, use implementations of AuthorizationManager as a replacement.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22257.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22257.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22257
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49769
published_at 2026-04-21T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.49797
published_at 2026-04-18T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49751
published_at 2026-04-13T12:55:00Z
3
value 0.00264
scoring_system epss
scoring_elements 0.4975
published_at 2026-04-12T12:55:00Z
4
value 0.00264
scoring_system epss
scoring_elements 0.49778
published_at 2026-04-11T12:55:00Z
5
value 0.00264
scoring_system epss
scoring_elements 0.49765
published_at 2026-04-08T12:55:00Z
6
value 0.00264
scoring_system epss
scoring_elements 0.4971
published_at 2026-04-07T12:55:00Z
7
value 0.00264
scoring_system epss
scoring_elements 0.49759
published_at 2026-04-09T12:55:00Z
8
value 0.00264
scoring_system epss
scoring_elements 0.49732
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22257
2
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
3
reference_url https://github.com/spring-projects/spring-security/commit/5a7f12f1a9fdb4edaab6f61495f1d781a7273b61
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security/commit/5a7f12f1a9fdb4edaab6f61495f1d781a7273b61
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-22257
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-22257
5
reference_url https://security.netapp.com/advisory/ntap-20240419-0005
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240419-0005
6
reference_url https://spring.io/security/cve-2024-22257
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T15:22:14Z/
url https://spring.io/security/cve-2024-22257
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270158
reference_id 2270158
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270158
8
reference_url https://github.com/advisories/GHSA-f3jh-qvm4-mg39
reference_id GHSA-f3jh-qvm4-mg39
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f3jh-qvm4-mg39
9
reference_url https://security.netapp.com/advisory/ntap-20240419-0005/
reference_id ntap-20240419-0005
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T15:22:14Z/
url https://security.netapp.com/advisory/ntap-20240419-0005/
10
reference_url https://access.redhat.com/errata/RHSA-2024:3708
reference_id RHSA-2024:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3708
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-core@6.1.8
purl pkg:maven/org.springframework.security/spring-security-core@6.1.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.1.8
1
url pkg:maven/org.springframework.security/spring-security-core@6.2.3
purl pkg:maven/org.springframework.security/spring-security-core@6.2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.2.3
aliases CVE-2024-22257, GHSA-f3jh-qvm4-mg39
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwcq-d6nf-1ubn
2
url VCID-sguk-f634-sfgs
vulnerability_id VCID-sguk-f634-sfgs
summary
Spring Security's spring-security.xsd file is world writable
The spring-security.xsd file inside the spring-security-config jar is world writable which means that if it were extracted it could be written by anyone with access to the file system.

While there are no known exploits, this is an example of “CWE-732: Incorrect Permission Assignment for Critical Resource” and could result in an exploit. Users should update to the latest version of Spring Security to mitigate any future exploits found around this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34042.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34042
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13103
published_at 2026-04-21T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13226
published_at 2026-04-02T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13292
published_at 2026-04-04T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.1309
published_at 2026-04-07T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13171
published_at 2026-04-08T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13223
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13191
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13154
published_at 2026-04-12T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13102
published_at 2026-04-13T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13003
published_at 2026-04-16T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13006
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34042
2
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
3
reference_url https://github.com/spring-projects/spring-security/commit/5b293d21161e946bf241d9e974b9af93cfafaaac
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security/commit/5b293d21161e946bf241d9e974b9af93cfafaaac
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-34042
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-34042
5
reference_url https://security.netapp.com/advisory/ntap-20241129-0010
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241129-0010
6
reference_url https://spring.io/security/cve-2023-34042
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T16:00:46Z/
url https://spring.io/security/cve-2023-34042
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262911
reference_id 2262911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262911
8
reference_url https://github.com/advisories/GHSA-9gp8-6cg8-7h34
reference_id GHSA-9gp8-6cg8-7h34
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9gp8-6cg8-7h34
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-core@6.1.4
purl pkg:maven/org.springframework.security/spring-security-core@6.1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42hz-39hx-myh7
1
vulnerability VCID-dwcq-d6nf-1ubn
2
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.1.4
aliases CVE-2023-34042, GHSA-9gp8-6cg8-7h34
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sguk-f634-sfgs
3
url VCID-u6vb-w2bu-ykfk
vulnerability_id VCID-u6vb-w2bu-ykfk
summary
Spring Framework has Authorization Bypass for Case Sensitive Comparisons
The usage of String.toLowerCase() and String.toUpperCase() has some Locale dependent exceptions that could potentially result in authorization rules not working properly.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38827.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38827.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38827
reference_id
reference_type
scores
0
value 0.00294
scoring_system epss
scoring_elements 0.52713
published_at 2026-04-21T12:55:00Z
1
value 0.00294
scoring_system epss
scoring_elements 0.52729
published_at 2026-04-18T12:55:00Z
2
value 0.00294
scoring_system epss
scoring_elements 0.52653
published_at 2026-04-04T12:55:00Z
3
value 0.00294
scoring_system epss
scoring_elements 0.52627
published_at 2026-04-02T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.5262
published_at 2026-04-07T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.5267
published_at 2026-04-08T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52664
published_at 2026-04-09T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52715
published_at 2026-04-11T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52698
published_at 2026-04-12T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.52722
published_at 2026-04-16T12:55:00Z
10
value 0.00294
scoring_system epss
scoring_elements 0.52683
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38827
2
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
url https://github.com/spring-projects/spring-framework
3
reference_url https://github.com/spring-projects/spring-framework/commit/11d4272ff48b4a4dabc4b28dfbff0364a4204bc9
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/11d4272ff48b4a4dabc4b28dfbff0364a4204bc9
4
reference_url https://github.com/spring-projects/spring-framework/issues/33708
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/issues/33708
5
reference_url https://github.com/spring-projects/spring-framework/issues/34232
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/issues/34232
6
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-38827
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-38827
8
reference_url https://security.netapp.com/advisory/ntap-20250124-0007
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20250124-0007
9
reference_url https://spring.io/security/cve-2024-38827
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T15:27:02Z/
url https://spring.io/security/cve-2024-38827
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2329971
reference_id 2329971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2329971
11
reference_url https://github.com/advisories/GHSA-q3v6-hm2v-pw99
reference_id GHSA-q3v6-hm2v-pw99
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q3v6-hm2v-pw99
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-core@6.1.12
purl pkg:maven/org.springframework.security/spring-security-core@6.1.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.1.12
1
url pkg:maven/org.springframework.security/spring-security-core@6.2.8
purl pkg:maven/org.springframework.security/spring-security-core@6.2.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.2.8
2
url pkg:maven/org.springframework.security/spring-security-core@6.3.5
purl pkg:maven/org.springframework.security/spring-security-core@6.3.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.3.5
aliases CVE-2024-38827, GHSA-q3v6-hm2v-pw99
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u6vb-w2bu-ykfk
Fixing_vulnerabilities
0
url VCID-7ceg-a9bh-fkau
vulnerability_id VCID-7ceg-a9bh-fkau
summary
Incorrect Authorization
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)

Specifically, an application is vulnerable when all of the following are true:

 * Spring MVC is on the classpath
 * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet)
 * The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints


An application is not vulnerable if any of the following is true:

 * The application does not have Spring MVC on the classpath
 * The application secures no servlets other than Spring MVC’s DispatcherServlet
 * The application uses requestMatchers(String) only for Spring MVC endpoints
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34035
reference_id
reference_type
scores
0
value 0.02176
scoring_system epss
scoring_elements 0.8428
published_at 2026-04-02T12:55:00Z
1
value 0.02176
scoring_system epss
scoring_elements 0.84345
published_at 2026-04-11T12:55:00Z
2
value 0.02176
scoring_system epss
scoring_elements 0.84327
published_at 2026-04-09T12:55:00Z
3
value 0.02176
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-08T12:55:00Z
4
value 0.02176
scoring_system epss
scoring_elements 0.84299
published_at 2026-04-07T12:55:00Z
5
value 0.02472
scoring_system epss
scoring_elements 0.85275
published_at 2026-04-12T12:55:00Z
6
value 0.02472
scoring_system epss
scoring_elements 0.85291
published_at 2026-04-21T12:55:00Z
7
value 0.02472
scoring_system epss
scoring_elements 0.85294
published_at 2026-04-18T12:55:00Z
8
value 0.02472
scoring_system epss
scoring_elements 0.85293
published_at 2026-04-16T12:55:00Z
9
value 0.02472
scoring_system epss
scoring_elements 0.85272
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34035
1
reference_url https://github.com/spring-projects/spring-security/commit/bb46a5427005e33e637b15948de8adae244ce547
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security/commit/bb46a5427005e33e637b15948de8adae244ce547
2
reference_url https://github.com/spring-projects/spring-security/commit/df239b6448ccf138b0c95b5575a88f33ac35cd9a
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security/commit/df239b6448ccf138b0c95b5575a88f33ac35cd9a
3
reference_url https://github.com/spring-projects/spring-security-samples/commit/4e3bec904a5467db28ea33e25ac9d90524b53d66
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security-samples/commit/4e3bec904a5467db28ea33e25ac9d90524b53d66
4
reference_url https://github.com/spring-projects/spring-security-samples/tree/main/servlet/java-configuration/authentication/preauth
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security-samples/tree/main/servlet/java-configuration/authentication/preauth
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-34035
reference_id CVE-2023-34035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-34035
6
reference_url https://spring.io/security/cve-2023-34035
reference_id CVE-2023-34035
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T15:47:27Z/
url https://spring.io/security/cve-2023-34035
7
reference_url https://github.com/advisories/GHSA-4vpr-xfrp-cj64
reference_id GHSA-4vpr-xfrp-cj64
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4vpr-xfrp-cj64
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-core@5.8.5
purl pkg:maven/org.springframework.security/spring-security-core@5.8.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwcq-d6nf-1ubn
1
vulnerability VCID-sguk-f634-sfgs
2
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@5.8.5
1
url pkg:maven/org.springframework.security/spring-security-core@6.0.5
purl pkg:maven/org.springframework.security/spring-security-core@6.0.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwcq-d6nf-1ubn
1
vulnerability VCID-sguk-f634-sfgs
2
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.0.5
2
url pkg:maven/org.springframework.security/spring-security-core@6.1.2
purl pkg:maven/org.springframework.security/spring-security-core@6.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42hz-39hx-myh7
1
vulnerability VCID-dwcq-d6nf-1ubn
2
vulnerability VCID-sguk-f634-sfgs
3
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.1.2
aliases CVE-2023-34035, GHSA-4vpr-xfrp-cj64
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ceg-a9bh-fkau
1
url VCID-8dx4-u4aa-xuet
vulnerability_id VCID-8dx4-u4aa-xuet
summary
Improper Handling of Inconsistent Structural Elements
Using "**" as a pattern in Spring Security configuration 
for WebFlux creates a mismatch in pattern matching between Spring 
Security and Spring WebFlux, and the potential for a security bypass.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34034.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34034.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34034
reference_id
reference_type
scores
0
value 0.47909
scoring_system epss
scoring_elements 0.97726
published_at 2026-04-21T12:55:00Z
1
value 0.47909
scoring_system epss
scoring_elements 0.97702
published_at 2026-04-02T12:55:00Z
2
value 0.47909
scoring_system epss
scoring_elements 0.97704
published_at 2026-04-04T12:55:00Z
3
value 0.47909
scoring_system epss
scoring_elements 0.97703
published_at 2026-04-07T12:55:00Z
4
value 0.47909
scoring_system epss
scoring_elements 0.97708
published_at 2026-04-08T12:55:00Z
5
value 0.47909
scoring_system epss
scoring_elements 0.97711
published_at 2026-04-09T12:55:00Z
6
value 0.47909
scoring_system epss
scoring_elements 0.97714
published_at 2026-04-11T12:55:00Z
7
value 0.47909
scoring_system epss
scoring_elements 0.97716
published_at 2026-04-12T12:55:00Z
8
value 0.47909
scoring_system epss
scoring_elements 0.97718
published_at 2026-04-13T12:55:00Z
9
value 0.47909
scoring_system epss
scoring_elements 0.97723
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34034
2
reference_url https://security.netapp.com/advisory/ntap-20230814-0008
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230814-0008
3
reference_url https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241271
reference_id 2241271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241271
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-34034
reference_id CVE-2023-34034
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-34034
6
reference_url https://ossindex.sonatype.org/vulnerability/CVE-2023-34034
reference_id CVE-2023-34034
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://ossindex.sonatype.org/vulnerability/CVE-2023-34034
7
reference_url https://spring.io/security/cve-2023-34034
reference_id CVE-2023-34034
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-28T14:34:24Z/
url https://spring.io/security/cve-2023-34034
8
reference_url https://github.com/advisories/GHSA-3h6f-g5f3-gc4w
reference_id GHSA-3h6f-g5f3-gc4w
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3h6f-g5f3-gc4w
9
reference_url https://security.netapp.com/advisory/ntap-20230814-0008/
reference_id ntap-20230814-0008
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-28T14:34:24Z/
url https://security.netapp.com/advisory/ntap-20230814-0008/
fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-core@5.6.12
purl pkg:maven/org.springframework.security/spring-security-core@5.6.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwcq-d6nf-1ubn
1
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@5.6.12
1
url pkg:maven/org.springframework.security/spring-security-core@5.7.10
purl pkg:maven/org.springframework.security/spring-security-core@5.7.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwcq-d6nf-1ubn
1
vulnerability VCID-sguk-f634-sfgs
2
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@5.7.10
2
url pkg:maven/org.springframework.security/spring-security-core@5.8.5
purl pkg:maven/org.springframework.security/spring-security-core@5.8.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwcq-d6nf-1ubn
1
vulnerability VCID-sguk-f634-sfgs
2
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@5.8.5
3
url pkg:maven/org.springframework.security/spring-security-core@6.0.5
purl pkg:maven/org.springframework.security/spring-security-core@6.0.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dwcq-d6nf-1ubn
1
vulnerability VCID-sguk-f634-sfgs
2
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.0.5
4
url pkg:maven/org.springframework.security/spring-security-core@6.1.2
purl pkg:maven/org.springframework.security/spring-security-core@6.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42hz-39hx-myh7
1
vulnerability VCID-dwcq-d6nf-1ubn
2
vulnerability VCID-sguk-f634-sfgs
3
vulnerability VCID-u6vb-w2bu-ykfk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.1.2
aliases CVE-2023-34034, GHSA-3h6f-g5f3-gc4w
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8dx4-u4aa-xuet
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-core@6.1.2