Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.springframework/spring-web@4.2.0.RELEASE
purl pkg:maven/org.springframework/spring-web@4.2.0.RELEASE
Next non-vulnerable version 6.1.12
Latest non-vulnerable version 6.2.8
Risk 4.5
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-5ng1-3a32-cugs
Aliases:
CVE-2024-22262
GHSA-2wrp-6fg6-hmc5
Spring Framework URL Parsing with Host Validation Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
5.3.34
Affected by 2 other vulnerabilities.
6.0.19
Affected by 1 other vulnerability.
6.1.6
Affected by 1 other vulnerability.
VCID-ec6g-dnjb-vycb
Aliases:
CVE-2015-5211
GHSA-pgf9-h69p-pcgf
Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response.
4.2.2.RELEASE
Affected by 5 other vulnerabilities.
VCID-kpma-e8rd-b7c8
Aliases:
CVE-2016-1000027
GHSA-4wrc-f8pq-fpqp
Pivotal Spring Framework contains unsafe Java deserialization methods Pivotal Spring Framework before 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. Maintainers recommend investigating alternative components or a potential mitigating control. Version 4.2.6 and 3.2.17 contain [enhanced documentation](https://github.com/spring-projects/spring-framework/commit/5cbe90b2cd91b866a5a9586e460f311860e11cfa) advising users to take precautions against unsafe Java deserialization, version 5.3.0 [deprecate the impacted classes](https://github.com/spring-projects/spring-framework/issues/25379) and version 6.0.0 [removed it entirely](https://github.com/spring-projects/spring-framework/issues/27422).
6.0.0
Affected by 5 other vulnerabilities.
VCID-pht6-8af8-b3f2
Aliases:
CVE-2018-15756
GHSA-ffvq-7w96-97p7
Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.
4.3.20.RELEASE
Affected by 4 other vulnerabilities.
5.0.10.RELEASE
Affected by 5 other vulnerabilities.
5.1.1.RELEASE
Affected by 5 other vulnerabilities.
VCID-x5w8-j62d-m7h6
Aliases:
CVE-2024-38809
GHSA-2rmj-mq67-h97g
Spring Framework DoS via conditional HTTP request ### Description Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack. ### Affected Spring Products and Versions org.springframework:spring-web in versions 6.1.0 through 6.1.11 6.0.0 through 6.0.22 5.3.0 through 5.3.37 Older, unsupported versions are also affected ### Mitigation Users of affected versions should upgrade to the corresponding fixed version. 6.1.x -> 6.1.12 6.0.x -> 6.0.23 5.3.x -> 5.3.38 No other mitigation steps are necessary. Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter.
5.3.38
Affected by 1 other vulnerability.
6.0.23
Affected by 1 other vulnerability.
6.1.12
Affected by 0 other vulnerabilities.
VCID-y3uz-etva-sufh
Aliases:
CVE-2020-5421
GHSA-rv39-3qh7-9v7w
Improper Input Validation in Spring Framework In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
4.2.9.RELEASE
Affected by 4 other vulnerabilities.
4.3.28.RELEASE
Affected by 3 other vulnerabilities.
4.3.29.RELEASE
Affected by 3 other vulnerabilities.
5.0.18.RELEASE
Affected by 3 other vulnerabilities.
5.0.19.RELEASE
Affected by 3 other vulnerabilities.
5.1.17.RELEASE
Affected by 3 other vulnerabilities.
5.1.18.RELEASE
Affected by 3 other vulnerabilities.
5.2.8.RELEASE
Affected by 3 other vulnerabilities.
5.2.9.RELEASE
Affected by 3 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T23:09:24.472621+00:00 GitLab Importer Affected by VCID-x5w8-j62d-m7h6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml 38.4.0
2026-04-16T22:55:59.862512+00:00 GitLab Importer Affected by VCID-5ng1-3a32-cugs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-22262.yml 38.4.0
2026-04-16T22:02:09.552237+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.4.0
2026-04-16T21:12:04.349353+00:00 GitLab Importer Affected by VCID-y3uz-etva-sufh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5421.yml 38.4.0
2026-04-16T20:49:08.852042+00:00 GitLab Importer Affected by VCID-pht6-8af8-b3f2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2018-15756.yml 38.4.0
2026-04-16T20:37:05.679332+00:00 GitLab Importer Affected by VCID-ec6g-dnjb-vycb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2015-5211.yml 38.4.0
2026-04-12T00:27:38.364144+00:00 GitLab Importer Affected by VCID-x5w8-j62d-m7h6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml 38.3.0
2026-04-12T00:14:36.481154+00:00 GitLab Importer Affected by VCID-5ng1-3a32-cugs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-22262.yml 38.3.0
2026-04-11T23:17:47.194616+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.3.0
2026-04-11T22:24:01.875061+00:00 GitLab Importer Affected by VCID-y3uz-etva-sufh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5421.yml 38.3.0
2026-04-11T22:00:09.640423+00:00 GitLab Importer Affected by VCID-pht6-8af8-b3f2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2018-15756.yml 38.3.0
2026-04-11T21:47:41.956302+00:00 GitLab Importer Affected by VCID-ec6g-dnjb-vycb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2015-5211.yml 38.3.0
2026-04-03T00:35:20.956294+00:00 GitLab Importer Affected by VCID-x5w8-j62d-m7h6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml 38.1.0
2026-04-03T00:20:56.995092+00:00 GitLab Importer Affected by VCID-5ng1-3a32-cugs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-22262.yml 38.1.0
2026-04-02T23:25:28.509755+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.1.0
2026-04-02T22:35:58.984083+00:00 GitLab Importer Affected by VCID-y3uz-etva-sufh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5421.yml 38.1.0
2026-04-02T22:13:16.665537+00:00 GitLab Importer Affected by VCID-pht6-8af8-b3f2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2018-15756.yml 38.1.0
2026-04-02T22:01:37.591852+00:00 GitLab Importer Affected by VCID-ec6g-dnjb-vycb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2015-5211.yml 38.1.0
2026-04-01T17:46:14.999971+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.0.0
2026-04-01T16:53:14.152067+00:00 GitLab Importer Affected by VCID-y3uz-etva-sufh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5421.yml 38.0.0
2026-04-01T16:18:49.816360+00:00 GitLab Importer Affected by VCID-ec6g-dnjb-vycb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2015-5211.yml 38.0.0
2026-04-01T12:48:05.524779+00:00 GitLab Importer Affected by VCID-pht6-8af8-b3f2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2018-15756.yml 38.0.0