Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-zhfj-byuj-6uhk
Summary
Spring Security vulnerable to Authorization Bypass of Static Resources in WebFlux Applications
Spring WebFlux applications that have Spring Security authorization rules on static resources can be bypassed under certain circumstances.

For this to impact an application, all of the following must be true:

  *  It must be a WebFlux application
  *  It must be using Spring's static resources support
  *  It must have a non-permitAll authorization rule applied to the static resources support
Aliases
0
alias CVE-2024-38821
1
alias GHSA-c4q5-6c82-3qpw
Fixed_packages
0
url pkg:maven/org.springframework.security/spring-security-web@5.7.13
purl pkg:maven/org.springframework.security/spring-security-web@5.7.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.7.13
1
url pkg:maven/org.springframework.security/spring-security-web@5.8.15
purl pkg:maven/org.springframework.security/spring-security-web@5.8.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.8.15
2
url pkg:maven/org.springframework.security/spring-security-web@6.2.7
purl pkg:maven/org.springframework.security/spring-security-web@6.2.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@6.2.7
3
url pkg:maven/org.springframework.security/spring-security-web@6.3.4
purl pkg:maven/org.springframework.security/spring-security-web@6.3.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@6.3.4
Affected_packages
0
url pkg:maven/org.springframework.security/spring-security-web@5.8.0
purl pkg:maven/org.springframework.security/spring-security-web@5.8.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9tg6-2h2y-abah
1
vulnerability VCID-vfqt-vr9q-2kfp
2
vulnerability VCID-zhfj-byuj-6uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@5.8.0
1
url pkg:maven/org.springframework.security/spring-security-web@6.0.0
purl pkg:maven/org.springframework.security/spring-security-web@6.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9tg6-2h2y-abah
1
vulnerability VCID-vfqt-vr9q-2kfp
2
vulnerability VCID-zhfj-byuj-6uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@6.0.0
2
url pkg:maven/org.springframework.security/spring-security-web@6.1.0
purl pkg:maven/org.springframework.security/spring-security-web@6.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
1
vulnerability VCID-zhfj-byuj-6uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@6.1.0
3
url pkg:maven/org.springframework.security/spring-security-web@6.2.0
purl pkg:maven/org.springframework.security/spring-security-web@6.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
1
vulnerability VCID-zhfj-byuj-6uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@6.2.0
4
url pkg:maven/org.springframework.security/spring-security-web@6.3.0
purl pkg:maven/org.springframework.security/spring-security-web@6.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vfqt-vr9q-2kfp
1
vulnerability VCID-zhfj-byuj-6uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework.security/spring-security-web@6.3.0
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38821.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38821.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38821
reference_id
reference_type
scores
0
value 0.1309
scoring_system epss
scoring_elements 0.94132
published_at 2026-04-21T12:55:00Z
1
value 0.1309
scoring_system epss
scoring_elements 0.94131
published_at 2026-04-18T12:55:00Z
2
value 0.1309
scoring_system epss
scoring_elements 0.94089
published_at 2026-04-04T12:55:00Z
3
value 0.1309
scoring_system epss
scoring_elements 0.94127
published_at 2026-04-16T12:55:00Z
4
value 0.1309
scoring_system epss
scoring_elements 0.9411
published_at 2026-04-12T12:55:00Z
5
value 0.1309
scoring_system epss
scoring_elements 0.94111
published_at 2026-04-13T12:55:00Z
6
value 0.1309
scoring_system epss
scoring_elements 0.94105
published_at 2026-04-09T12:55:00Z
7
value 0.1309
scoring_system epss
scoring_elements 0.94101
published_at 2026-04-08T12:55:00Z
8
value 0.1309
scoring_system epss
scoring_elements 0.94093
published_at 2026-04-07T12:55:00Z
9
value 0.1309
scoring_system epss
scoring_elements 0.94079
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38821
2
reference_url https://github.com/spring-projects/spring-security
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security
3
reference_url https://github.com/spring-projects/spring-security/commit/0e257b56ce35402558a260ffa6b368982f9a7934
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security/commit/0e257b56ce35402558a260ffa6b368982f9a7934
4
reference_url https://github.com/spring-projects/spring-security/commit/4ce7cde15599c0447163fd46bac616e03318bf5b
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-security/commit/4ce7cde15599c0447163fd46bac616e03318bf5b
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-38821
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-38821
6
reference_url https://security.netapp.com/advisory/ntap-20250124-0006
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20250124-0006
7
reference_url https://spring.io/security/cve-2024-38821
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-28T12:31:35Z/
url https://spring.io/security/cve-2024-38821
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322098
reference_id 2322098
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322098
9
reference_url https://github.com/advisories/GHSA-c4q5-6c82-3qpw
reference_id GHSA-c4q5-6c82-3qpw
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c4q5-6c82-3qpw
Weaknesses
0
cwe_id 285
name Improper Authorization
description The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
1
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
2
cwe_id 639
name Authorization Bypass Through User-Controlled Key
description The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
4
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score7.4 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-zhfj-byuj-6uhk