Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.springframework.security/spring-security-web@5.7.8
purl pkg:maven/org.springframework.security/spring-security-web@5.7.8
Next non-vulnerable version 6.5.9
Latest non-vulnerable version 7.0.4
Risk
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-vfqt-vr9q-2kfp
Aliases:
CVE-2026-22732
GHSA-mf92-479x-3373
Spring Security HTTP Headers Are not Written Under Some Conditions When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written.  This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.
6.5.9
Affected by 0 other vulnerabilities.
7.0.4
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-9tg6-2h2y-abah Incomplete Cleanup In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerability can keep users authenticated even after they performed logout. Users of affected versions should apply the following mitigation. 5.7.x users should upgrade to 5.7.8. 5.8.x users should upgrade to 5.8.3. 6.0.x users should upgrade to 6.0.3. CVE-2023-20862
GHSA-x873-6rgc-94jc