Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.springframework/spring-web@6.1.0
Typemaven
Namespaceorg.springframework
Namespring-web
Version6.1.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.1.12
Latest_non_vulnerable_version6.2.8
Affected_by_vulnerabilities
0
url VCID-2syk-pe22-f7cd
vulnerability_id VCID-2syk-pe22-f7cd
summary
Spring Web vulnerable to Open Redirect or Server Side Request Forgery
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a  open redirect attack or to a SSRF attack if the URL is used after passing validation checks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22243.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22243
reference_id
reference_type
scores
0
value 0.59593
scoring_system epss
scoring_elements 0.98258
published_at 2026-04-21T12:55:00Z
1
value 0.61736
scoring_system epss
scoring_elements 0.98323
published_at 2026-04-02T12:55:00Z
2
value 0.61736
scoring_system epss
scoring_elements 0.98341
published_at 2026-04-18T12:55:00Z
3
value 0.61736
scoring_system epss
scoring_elements 0.98336
published_at 2026-04-13T12:55:00Z
4
value 0.61736
scoring_system epss
scoring_elements 0.98333
published_at 2026-04-09T12:55:00Z
5
value 0.61736
scoring_system epss
scoring_elements 0.98332
published_at 2026-04-08T12:55:00Z
6
value 0.61736
scoring_system epss
scoring_elements 0.98327
published_at 2026-04-07T12:55:00Z
7
value 0.61736
scoring_system epss
scoring_elements 0.98325
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22243
3
reference_url http://seclists.org/fulldisclosure/2024/Sep/24
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2024/Sep/24
4
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
5
reference_url https://github.com/spring-projects/spring-framework/blob/main/spring-web/src/main/java/org/springframework/web/util/UriComponentsBuilder.java
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/blob/main/spring-web/src/main/java/org/springframework/web/util/UriComponentsBuilder.java
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-22243
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-22243
7
reference_url https://security.netapp.com/advisory/ntap-20240524-0001
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240524-0001
8
reference_url https://spring.io/security/cve-2024-22243
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:25Z/
url https://spring.io/security/cve-2024-22243
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2265735
reference_id 2265735
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2265735
10
reference_url https://github.com/advisories/GHSA-ccgv-vj62-xf9h
reference_id GHSA-ccgv-vj62-xf9h
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-ccgv-vj62-xf9h
11
reference_url https://security.netapp.com/advisory/ntap-20240524-0001/
reference_id ntap-20240524-0001
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:25Z/
url https://security.netapp.com/advisory/ntap-20240524-0001/
fixed_packages
0
url pkg:maven/org.springframework/spring-web@6.1.4
purl pkg:maven/org.springframework/spring-web@6.1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ng1-3a32-cugs
1
vulnerability VCID-x5w8-j62d-m7h6
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-web@6.1.4
aliases CVE-2024-22243, GHSA-ccgv-vj62-xf9h
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2syk-pe22-f7cd
1
url VCID-5ng1-3a32-cugs
vulnerability_id VCID-5ng1-3a32-cugs
summary
Spring Framework URL Parsing with Host Validation
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a  open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.

This is the same as  CVE-2024-22259 https://spring.io/security/cve-2024-22259  and  CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22262.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22262.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22262
reference_id
reference_type
scores
0
value 0.12634
scoring_system epss
scoring_elements 0.93992
published_at 2026-04-21T12:55:00Z
1
value 0.12634
scoring_system epss
scoring_elements 0.93952
published_at 2026-04-04T12:55:00Z
2
value 0.12634
scoring_system epss
scoring_elements 0.9397
published_at 2026-04-13T12:55:00Z
3
value 0.12634
scoring_system epss
scoring_elements 0.93967
published_at 2026-04-09T12:55:00Z
4
value 0.12634
scoring_system epss
scoring_elements 0.93964
published_at 2026-04-08T12:55:00Z
5
value 0.12634
scoring_system epss
scoring_elements 0.93955
published_at 2026-04-07T12:55:00Z
6
value 0.12634
scoring_system epss
scoring_elements 0.93943
published_at 2026-04-02T12:55:00Z
7
value 0.12634
scoring_system epss
scoring_elements 0.93991
published_at 2026-04-18T12:55:00Z
8
value 0.12634
scoring_system epss
scoring_elements 0.93985
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22262
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22262
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22262
3
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
4
reference_url https://github.com/spring-projects/spring-framework/blob/main/spring-web/src/main/java/org/springframework/web/util/UriComponentsBuilder.java
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/blob/main/spring-web/src/main/java/org/springframework/web/util/UriComponentsBuilder.java
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-22262
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-22262
6
reference_url https://security.netapp.com/advisory/ntap-20240524-0003
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240524-0003
7
reference_url https://spring.io/security/cve-2024-22262
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T03:55:13Z/
url https://spring.io/security/cve-2024-22262
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275257
reference_id 2275257
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275257
9
reference_url https://github.com/advisories/GHSA-2wrp-6fg6-hmc5
reference_id GHSA-2wrp-6fg6-hmc5
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2wrp-6fg6-hmc5
10
reference_url https://security.netapp.com/advisory/ntap-20240524-0003/
reference_id ntap-20240524-0003
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T03:55:13Z/
url https://security.netapp.com/advisory/ntap-20240524-0003/
11
reference_url https://access.redhat.com/errata/RHSA-2024:3708
reference_id RHSA-2024:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3708
fixed_packages
0
url pkg:maven/org.springframework/spring-web@6.1.6
purl pkg:maven/org.springframework/spring-web@6.1.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-x5w8-j62d-m7h6
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-web@6.1.6
aliases CVE-2024-22262, GHSA-2wrp-6fg6-hmc5
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ng1-3a32-cugs
2
url VCID-dnat-v8gu-aqdn
vulnerability_id VCID-dnat-v8gu-aqdn
summary
Spring Framework URL Parsing with Host Validation Vulnerability
Applications that use UriComponentsBuilder in Spring Framework to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a  open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.

This is the same as  CVE-2024-22243 https://spring.io/security/cve-2024-22243, but with different input.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22259.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22259.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22259
reference_id
reference_type
scores
0
value 0.56395
scoring_system epss
scoring_elements 0.98121
published_at 2026-04-21T12:55:00Z
1
value 0.56395
scoring_system epss
scoring_elements 0.98125
published_at 2026-04-18T12:55:00Z
2
value 0.56395
scoring_system epss
scoring_elements 0.98123
published_at 2026-04-16T12:55:00Z
3
value 0.56395
scoring_system epss
scoring_elements 0.98117
published_at 2026-04-13T12:55:00Z
4
value 0.56395
scoring_system epss
scoring_elements 0.98116
published_at 2026-04-12T12:55:00Z
5
value 0.56395
scoring_system epss
scoring_elements 0.98111
published_at 2026-04-09T12:55:00Z
6
value 0.56395
scoring_system epss
scoring_elements 0.98107
published_at 2026-04-07T12:55:00Z
7
value 0.56395
scoring_system epss
scoring_elements 0.98103
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22259
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22259
3
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
4
reference_url https://github.com/spring-projects/spring-framework/commit/297cbae2990e1413537c55845a7e0ea0ffd9f9bb
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/297cbae2990e1413537c55845a7e0ea0ffd9f9bb
5
reference_url https://github.com/spring-projects/spring-framework/commit/381f790329a48b74c2a49fc1384dd68ca9153501
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/381f790329a48b74c2a49fc1384dd68ca9153501
6
reference_url https://github.com/spring-projects/spring-framework/commit/f2fd2f12269c6a781c5b2c20b3c24141055a3d68
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/f2fd2f12269c6a781c5b2c20b3c24141055a3d68
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-22259
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-22259
8
reference_url https://security.netapp.com/advisory/ntap-20240524-0002
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240524-0002
9
reference_url https://spring.io/security/cve-2024-22259
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T03:55:11Z/
url https://spring.io/security/cve-2024-22259
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269846
reference_id 2269846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2269846
11
reference_url https://github.com/advisories/GHSA-hgjh-9rj2-g67j
reference_id GHSA-hgjh-9rj2-g67j
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hgjh-9rj2-g67j
12
reference_url https://security.netapp.com/advisory/ntap-20240524-0002/
reference_id ntap-20240524-0002
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-27T03:55:11Z/
url https://security.netapp.com/advisory/ntap-20240524-0002/
fixed_packages
0
url pkg:maven/org.springframework/spring-web@6.1.5
purl pkg:maven/org.springframework/spring-web@6.1.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ng1-3a32-cugs
1
vulnerability VCID-x5w8-j62d-m7h6
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-web@6.1.5
aliases CVE-2024-22259, GHSA-hgjh-9rj2-g67j
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dnat-v8gu-aqdn
3
url VCID-pzz7-mfs4-rfda
vulnerability_id VCID-pzz7-mfs4-rfda
summary
Spring Framework DataBinder Case Sensitive Match Exception
The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38820
reference_id
reference_type
scores
0
value 0.01473
scoring_system epss
scoring_elements 0.80911
published_at 2026-04-07T12:55:00Z
1
value 0.01473
scoring_system epss
scoring_elements 0.80977
published_at 2026-04-16T12:55:00Z
2
value 0.01473
scoring_system epss
scoring_elements 0.80941
published_at 2026-04-13T12:55:00Z
3
value 0.01473
scoring_system epss
scoring_elements 0.8095
published_at 2026-04-12T12:55:00Z
4
value 0.01473
scoring_system epss
scoring_elements 0.80964
published_at 2026-04-11T12:55:00Z
5
value 0.01473
scoring_system epss
scoring_elements 0.80948
published_at 2026-04-09T12:55:00Z
6
value 0.01473
scoring_system epss
scoring_elements 0.8089
published_at 2026-04-02T12:55:00Z
7
value 0.01473
scoring_system epss
scoring_elements 0.80913
published_at 2026-04-04T12:55:00Z
8
value 0.01473
scoring_system epss
scoring_elements 0.80939
published_at 2026-04-08T12:55:00Z
9
value 0.01473
scoring_system epss
scoring_elements 0.80979
published_at 2026-04-18T12:55:00Z
10
value 0.01514
scoring_system epss
scoring_elements 0.81253
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38820
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38820
2
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
3
reference_url https://github.com/spring-projects/spring-framework/commit/23656aebc6c7d0f9faff1080981eb4d55eff296c
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/23656aebc6c7d0f9faff1080981eb4d55eff296c
4
reference_url https://github.com/spring-projects/spring-framework/commits/v6.2.0-RC2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commits/v6.2.0-RC2
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-38820
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-38820
6
reference_url https://security.netapp.com/advisory/ntap-20241129-0003
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241129-0003
7
reference_url https://spring.io/security/cve-2024-38820
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-18T16:33:48Z/
url https://spring.io/security/cve-2024-38820
8
reference_url https://github.com/advisories/GHSA-4gc7-5j7h-4qph
reference_id GHSA-4gc7-5j7h-4qph
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4gc7-5j7h-4qph
fixed_packages
0
url pkg:maven/org.springframework/spring-web@6.1.14
purl pkg:maven/org.springframework/spring-web@6.1.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-web@6.1.14
aliases CVE-2024-38820, GHSA-4gc7-5j7h-4qph
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pzz7-mfs4-rfda
4
url VCID-q4ad-g67b-efaj
vulnerability_id VCID-q4ad-g67b-efaj
summary
Spring Framework vulnerable to a reflected file download (RFD)
### Description

In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input.

Specifically, an application is vulnerable when all the following are true:

  -  The header is prepared with `org.springframework.http.ContentDisposition`.
  -  The filename is set via `ContentDisposition.Builder#filename(String, Charset)`.
  -  The value for the filename is derived from user-supplied input.
  -  The application does not sanitize the user-supplied input.
  -  The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details).


An application is not vulnerable if any of the following is true:

  -  The application does not set a “Content-Disposition” response header.
  -  The header is not prepared with `org.springframework.http.ContentDisposition`.
  -  The filename is set via one of:  
     - `ContentDisposition.Builder#filename(String)`, or
     - `ContentDisposition.Builder#filename(String, ASCII)`
  -  The filename is not derived from user-supplied input.
  -  The filename is derived from user-supplied input but sanitized by the application.
  -  The attacker cannot inject malicious content in the downloaded content of the response.


### Affected Spring Products and VersionsSpring Framework

  -  6.2.0 - 6.2.7
  -  6.1.0 - 6.1.20
  -  6.0.5 - 6.0.28
  -  Older, unsupported versions are not affected


### Mitigation

Users of affected versions should upgrade to the corresponding fixed version.

| Affected version(s) | Fix version | Availability |
| - | - | - |
| 6.2.x | 6.2.8 | OSS |
| 6.1.x | 6.1.21 | OSS |
| 6.0.x | 6.0.29 | [Commercial](https://enterprise.spring.io/) |

No further mitigation steps are necessary.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-41234.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-41234.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-41234
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29284
published_at 2026-04-02T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29333
published_at 2026-04-04T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29145
published_at 2026-04-07T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47067
published_at 2026-04-12T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.47093
published_at 2026-04-11T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47072
published_at 2026-04-08T12:55:00Z
6
value 0.0024
scoring_system epss
scoring_elements 0.47068
published_at 2026-04-09T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.47126
published_at 2026-04-18T12:55:00Z
8
value 0.0024
scoring_system epss
scoring_elements 0.4713
published_at 2026-04-16T12:55:00Z
9
value 0.0024
scoring_system epss
scoring_elements 0.47074
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-41234
2
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
3
reference_url https://github.com/spring-projects/spring-framework/commit/f0e7b42704e6b33958f242d91bd690d6ef7ada9c
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/f0e7b42704e6b33958f242d91bd690d6ef7ada9c
4
reference_url https://github.com/spring-projects/spring-framework/issues/35034
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/issues/35034
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-41234
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T14:03:20Z/
url https://nvd.nist.gov/vuln/detail/CVE-2025-41234
6
reference_url https://spring.io/security/cve-2025-41234
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T14:03:20Z/
url https://spring.io/security/cve-2025-41234
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2372578
reference_id 2372578
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2372578
8
reference_url https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N&version=3.1
reference_id A:N&version=3.1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T14:03:20Z/
url https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N&version=3.1
9
reference_url https://github.com/advisories/GHSA-6r3c-xf4w-jxjm
reference_id GHSA-6r3c-xf4w-jxjm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6r3c-xf4w-jxjm
fixed_packages
0
url pkg:maven/org.springframework/spring-web@6.1.21
purl pkg:maven/org.springframework/spring-web@6.1.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-web@6.1.21
1
url pkg:maven/org.springframework/spring-web@6.2.8
purl pkg:maven/org.springframework/spring-web@6.2.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-web@6.2.8
aliases CVE-2025-41234, GHSA-6r3c-xf4w-jxjm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4ad-g67b-efaj
5
url VCID-x5w8-j62d-m7h6
vulnerability_id VCID-x5w8-j62d-m7h6
summary
Spring Framework DoS via conditional HTTP request
### Description
Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack.

### Affected Spring Products and Versions
org.springframework:spring-web in versions 

6.1.0 through 6.1.11
6.0.0 through 6.0.22
5.3.0 through 5.3.37

Older, unsupported versions are also affected

### Mitigation
Users of affected versions should upgrade to the corresponding fixed version.
6.1.x -> 6.1.12
6.0.x -> 6.0.23
5.3.x -> 5.3.38
No other mitigation steps are necessary.

Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38809.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38809
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.3416
published_at 2026-04-21T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.34196
published_at 2026-04-18T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34208
published_at 2026-04-16T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34176
published_at 2026-04-13T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34199
published_at 2026-04-12T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.3421
published_at 2026-04-08T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34168
published_at 2026-04-07T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34304
published_at 2026-04-04T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34272
published_at 2026-04-02T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.3424
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38809
3
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
4
reference_url https://github.com/spring-projects/spring-framework/commit/582bfccbb72e5c8959a0b472d1dc7d03a20520f3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/582bfccbb72e5c8959a0b472d1dc7d03a20520f3
5
reference_url https://github.com/spring-projects/spring-framework/commit/8d16a50907c11f7e6b407d878a26e84eba08a533
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/8d16a50907c11f7e6b407d878a26e84eba08a533
6
reference_url https://github.com/spring-projects/spring-framework/commit/bb17ad8314b81850a939fd265fb53b3361705e85
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/bb17ad8314b81850a939fd265fb53b3361705e85
7
reference_url https://github.com/spring-projects/spring-framework/issues/33372
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/issues/33372
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-38809
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-38809
9
reference_url https://spring.io/security/cve-2024-38809
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:49:57Z/
url https://spring.io/security/cve-2024-38809
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314495
reference_id 2314495
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314495
11
reference_url https://github.com/advisories/GHSA-2rmj-mq67-h97g
reference_id GHSA-2rmj-mq67-h97g
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2rmj-mq67-h97g
12
reference_url https://access.redhat.com/errata/RHSA-2024:8064
reference_id RHSA-2024:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8064
fixed_packages
0
url pkg:maven/org.springframework/spring-web@6.1.12
purl pkg:maven/org.springframework/spring-web@6.1.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-web@6.1.12
aliases CVE-2024-38809, GHSA-2rmj-mq67-h97g
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5w8-j62d-m7h6
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-web@6.1.0