Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.springframework/spring-web@5.1.3.RELEASE
purl pkg:maven/org.springframework/spring-web@5.1.3.RELEASE
Next non-vulnerable version 6.1.12
Latest non-vulnerable version 6.2.8
Risk 10.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-5ng1-3a32-cugs
Aliases:
CVE-2024-22262
GHSA-2wrp-6fg6-hmc5
Spring Framework URL Parsing with Host Validation Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
5.3.34
Affected by 2 other vulnerabilities.
6.0.19
Affected by 1 other vulnerability.
6.1.6
Affected by 1 other vulnerability.
VCID-kpma-e8rd-b7c8
Aliases:
CVE-2016-1000027
GHSA-4wrc-f8pq-fpqp
Pivotal Spring Framework contains unsafe Java deserialization methods Pivotal Spring Framework before 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. Maintainers recommend investigating alternative components or a potential mitigating control. Version 4.2.6 and 3.2.17 contain [enhanced documentation](https://github.com/spring-projects/spring-framework/commit/5cbe90b2cd91b866a5a9586e460f311860e11cfa) advising users to take precautions against unsafe Java deserialization, version 5.3.0 [deprecate the impacted classes](https://github.com/spring-projects/spring-framework/issues/25379) and version 6.0.0 [removed it entirely](https://github.com/spring-projects/spring-framework/issues/27422).
6.0.0
Affected by 5 other vulnerabilities.
VCID-u7kk-c6fm-judy
Aliases:
CVE-2020-5398
GHSA-8wx2-9q48-vm9r
RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
5.1.13.RELEASE
Affected by 4 other vulnerabilities.
5.1.14.RELEASE
Affected by 4 other vulnerabilities.
5.2.3.RELEASE
Affected by 4 other vulnerabilities.
VCID-x5w8-j62d-m7h6
Aliases:
CVE-2024-38809
GHSA-2rmj-mq67-h97g
Spring Framework DoS via conditional HTTP request ### Description Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack. ### Affected Spring Products and Versions org.springframework:spring-web in versions 6.1.0 through 6.1.11 6.0.0 through 6.0.22 5.3.0 through 5.3.37 Older, unsupported versions are also affected ### Mitigation Users of affected versions should upgrade to the corresponding fixed version. 6.1.x -> 6.1.12 6.0.x -> 6.0.23 5.3.x -> 5.3.38 No other mitigation steps are necessary. Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter.
5.3.38
Affected by 1 other vulnerability.
6.0.23
Affected by 1 other vulnerability.
6.1.12
Affected by 0 other vulnerabilities.
VCID-y3uz-etva-sufh
Aliases:
CVE-2020-5421
GHSA-rv39-3qh7-9v7w
Improper Input Validation in Spring Framework In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
5.1.17.RELEASE
Affected by 3 other vulnerabilities.
5.1.18.RELEASE
Affected by 3 other vulnerabilities.
5.2.8.RELEASE
Affected by 3 other vulnerabilities.
5.2.9.RELEASE
Affected by 3 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T23:09:24.691672+00:00 GitLab Importer Affected by VCID-x5w8-j62d-m7h6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml 38.4.0
2026-04-16T22:56:00.073515+00:00 GitLab Importer Affected by VCID-5ng1-3a32-cugs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-22262.yml 38.4.0
2026-04-16T22:02:09.777844+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.4.0
2026-04-16T21:12:04.569953+00:00 GitLab Importer Affected by VCID-y3uz-etva-sufh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5421.yml 38.4.0
2026-04-16T20:59:53.946557+00:00 GitLab Importer Affected by VCID-u7kk-c6fm-judy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5398.yml 38.4.0
2026-04-12T00:27:38.597554+00:00 GitLab Importer Affected by VCID-x5w8-j62d-m7h6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml 38.3.0
2026-04-12T00:14:36.719911+00:00 GitLab Importer Affected by VCID-5ng1-3a32-cugs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-22262.yml 38.3.0
2026-04-11T23:17:47.442981+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.3.0
2026-04-11T22:24:02.159807+00:00 GitLab Importer Affected by VCID-y3uz-etva-sufh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5421.yml 38.3.0
2026-04-11T22:11:08.840580+00:00 GitLab Importer Affected by VCID-u7kk-c6fm-judy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5398.yml 38.3.0
2026-04-03T00:35:21.200326+00:00 GitLab Importer Affected by VCID-x5w8-j62d-m7h6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml 38.1.0
2026-04-03T00:20:57.235276+00:00 GitLab Importer Affected by VCID-5ng1-3a32-cugs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-22262.yml 38.1.0
2026-04-02T23:25:28.723366+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.1.0
2026-04-02T22:35:59.199903+00:00 GitLab Importer Affected by VCID-y3uz-etva-sufh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5421.yml 38.1.0
2026-04-02T22:23:40.071071+00:00 GitLab Importer Affected by VCID-u7kk-c6fm-judy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5398.yml 38.1.0
2026-04-01T17:46:15.246911+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.0.0
2026-04-01T16:53:14.406545+00:00 GitLab Importer Affected by VCID-y3uz-etva-sufh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5421.yml 38.0.0
2026-04-01T16:41:28.057202+00:00 GitLab Importer Affected by VCID-u7kk-c6fm-judy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2020-5398.yml 38.0.0