Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-afh4-nhxq-y3he
Summary
Spring Framework is vulnerable to security bypass via mvcRequestMatcher pattern mismatch
Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.
Aliases
0
alias CVE-2023-20860
1
alias GHSA-7phw-cxx7-q9vq
Fixed_packages
0
url pkg:maven/org.springframework/spring@5.3.26
purl pkg:maven/org.springframework/spring@5.3.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring@5.3.26
1
url pkg:maven/org.springframework/spring-webmvc@5.3.26
purl pkg:maven/org.springframework/spring-webmvc@5.3.26
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7x5d-wtf5-3kau
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@5.3.26
2
url pkg:maven/org.springframework/spring-webmvc@6.0.7
purl pkg:maven/org.springframework/spring-webmvc@6.0.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-85tn-8nj1-xyak
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@6.0.7
Affected_packages
0
url pkg:maven/org.springframework/spring@5.3.0
purl pkg:maven/org.springframework/spring@5.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-afh4-nhxq-y3he
1
vulnerability VCID-ygpk-fb56-sqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring@5.3.0
1
url pkg:maven/org.springframework/spring@6.0.0
purl pkg:maven/org.springframework/spring@6.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-afh4-nhxq-y3he
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring@6.0.0
2
url pkg:maven/org.springframework/spring-webmvc@5.3.0
purl pkg:maven/org.springframework/spring-webmvc@5.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7x5d-wtf5-3kau
1
vulnerability VCID-85dj-ems3-vyh4
2
vulnerability VCID-afh4-nhxq-y3he
3
vulnerability VCID-cyjt-4vjn-mbc7
4
vulnerability VCID-dy4t-tm9m-rfex
5
vulnerability VCID-gxnm-rk3x-zkdw
6
vulnerability VCID-n1vf-acj7-gkaf
7
vulnerability VCID-sh22-dem5-aqf3
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@5.3.0
3
url pkg:maven/org.springframework/spring-webmvc@6.0.0
purl pkg:maven/org.springframework/spring-webmvc@6.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-85dj-ems3-vyh4
1
vulnerability VCID-85tn-8nj1-xyak
2
vulnerability VCID-afh4-nhxq-y3he
3
vulnerability VCID-atm8-hukt-xfh4
4
vulnerability VCID-gxnm-rk3x-zkdw
5
vulnerability VCID-n1vf-acj7-gkaf
6
vulnerability VCID-sh22-dem5-aqf3
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webmvc@6.0.0
4
url pkg:rpm/redhat/jenkins@2.401.1.1685677065-1?arch=el8
purl pkg:rpm/redhat/jenkins@2.401.1.1685677065-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9442-1vwr-5fbt
1
vulnerability VCID-afh4-nhxq-y3he
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.401.1.1685677065-1%3Farch=el8
5
url pkg:rpm/redhat/jenkins@2.401.1.1686649641-3?arch=el8
purl pkg:rpm/redhat/jenkins@2.401.1.1686649641-3?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cup-9gdn-yyhk
1
vulnerability VCID-afh4-nhxq-y3he
2
vulnerability VCID-z3th-j593-m7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.401.1.1686649641-3%3Farch=el8
6
url pkg:rpm/redhat/jenkins@2.401.1.1686680404-3?arch=el8
purl pkg:rpm/redhat/jenkins@2.401.1.1686680404-3?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-432r-ukuw-4bgt
1
vulnerability VCID-6925-fwf4-f7df
2
vulnerability VCID-7k5m-ys11-mfby
3
vulnerability VCID-afh4-nhxq-y3he
4
vulnerability VCID-z3th-j593-m7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.401.1.1686680404-3%3Farch=el8
7
url pkg:rpm/redhat/jenkins@2.401.1.1686831596-3?arch=el8
purl pkg:rpm/redhat/jenkins@2.401.1.1686831596-3?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-432r-ukuw-4bgt
1
vulnerability VCID-6925-fwf4-f7df
2
vulnerability VCID-9442-1vwr-5fbt
3
vulnerability VCID-afh4-nhxq-y3he
4
vulnerability VCID-betz-7kth-p3cr
5
vulnerability VCID-cden-3spy-pyhz
6
vulnerability VCID-dvyn-8phs-a3a6
7
vulnerability VCID-wyec-gfgc-4yfw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.401.1.1686831596-3%3Farch=el8
8
url pkg:rpm/redhat/ovirt-dependencies@4.5.3-1?arch=el8ev
purl pkg:rpm/redhat/ovirt-dependencies@4.5.3-1?arch=el8ev
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-afh4-nhxq-y3he
1
vulnerability VCID-z3th-j593-m7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ovirt-dependencies@4.5.3-1%3Farch=el8ev
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20860.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20860.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-20860
reference_id
reference_type
scores
0
value 0.56284
scoring_system epss
scoring_elements 0.98118
published_at 2026-04-21T12:55:00Z
1
value 0.56284
scoring_system epss
scoring_elements 0.98099
published_at 2026-04-02T12:55:00Z
2
value 0.56284
scoring_system epss
scoring_elements 0.98103
published_at 2026-04-07T12:55:00Z
3
value 0.56284
scoring_system epss
scoring_elements 0.98108
published_at 2026-04-09T12:55:00Z
4
value 0.56284
scoring_system epss
scoring_elements 0.98113
published_at 2026-04-12T12:55:00Z
5
value 0.56284
scoring_system epss
scoring_elements 0.98114
published_at 2026-04-13T12:55:00Z
6
value 0.56284
scoring_system epss
scoring_elements 0.9812
published_at 2026-04-16T12:55:00Z
7
value 0.56284
scoring_system epss
scoring_elements 0.98122
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-20860
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20860
3
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
4
reference_url https://github.com/spring-projects/spring-framework/commit/202fa5cdb3a3d0cfe6967e85fa167d978244f28a
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/202fa5cdb3a3d0cfe6967e85fa167d978244f28a
5
reference_url https://security.netapp.com/advisory/ntap-20230505-0006
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230505-0006
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2180528
reference_id 2180528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2180528
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-20860
reference_id CVE-2023-20860
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-20860
8
reference_url https://spring.io/security/cve-2023-20860
reference_id CVE-2023-20860
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-19T19:05:19Z/
url https://spring.io/security/cve-2023-20860
9
reference_url https://github.com/advisories/GHSA-7phw-cxx7-q9vq
reference_id GHSA-7phw-cxx7-q9vq
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7phw-cxx7-q9vq
10
reference_url https://security.netapp.com/advisory/ntap-20230505-0006/
reference_id ntap-20230505-0006
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-19T19:05:19Z/
url https://security.netapp.com/advisory/ntap-20230505-0006/
11
reference_url https://access.redhat.com/errata/RHSA-2023:2100
reference_id RHSA-2023:2100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2100
12
reference_url https://access.redhat.com/errata/RHSA-2023:3185
reference_id RHSA-2023:3185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3185
13
reference_url https://access.redhat.com/errata/RHSA-2023:3610
reference_id RHSA-2023:3610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3610
14
reference_url https://access.redhat.com/errata/RHSA-2023:3622
reference_id RHSA-2023:3622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3622
15
reference_url https://access.redhat.com/errata/RHSA-2023:3625
reference_id RHSA-2023:3625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3625
16
reference_url https://access.redhat.com/errata/RHSA-2023:3663
reference_id RHSA-2023:3663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3663
17
reference_url https://access.redhat.com/errata/RHSA-2023:3771
reference_id RHSA-2023:3771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3771
18
reference_url https://access.redhat.com/errata/RHSA-2023:4983
reference_id RHSA-2023:4983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4983
Weaknesses
0
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
1
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
2
cwe_id 155
name Improper Neutralization of Wildcards or Matching Symbols
description The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as wildcards or matching symbols when they are sent to a downstream component.
Exploits
Severity_range_score7.5 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-afh4-nhxq-y3he