Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.springframework/spring-web@5.3.28
purl pkg:maven/org.springframework/spring-web@5.3.28
Next non-vulnerable version 6.1.12
Latest non-vulnerable version 6.2.8
Risk 4.5
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-5ng1-3a32-cugs
Aliases:
CVE-2024-22262
GHSA-2wrp-6fg6-hmc5
Spring Framework URL Parsing with Host Validation Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
5.3.34
Affected by 2 other vulnerabilities.
6.0.19
Affected by 1 other vulnerability.
6.1.6
Affected by 1 other vulnerability.
VCID-kpma-e8rd-b7c8
Aliases:
CVE-2016-1000027
GHSA-4wrc-f8pq-fpqp
Pivotal Spring Framework contains unsafe Java deserialization methods Pivotal Spring Framework before 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. Maintainers recommend investigating alternative components or a potential mitigating control. Version 4.2.6 and 3.2.17 contain [enhanced documentation](https://github.com/spring-projects/spring-framework/commit/5cbe90b2cd91b866a5a9586e460f311860e11cfa) advising users to take precautions against unsafe Java deserialization, version 5.3.0 [deprecate the impacted classes](https://github.com/spring-projects/spring-framework/issues/25379) and version 6.0.0 [removed it entirely](https://github.com/spring-projects/spring-framework/issues/27422).
6.0.0
Affected by 5 other vulnerabilities.
VCID-x5w8-j62d-m7h6
Aliases:
CVE-2024-38809
GHSA-2rmj-mq67-h97g
Spring Framework DoS via conditional HTTP request ### Description Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack. ### Affected Spring Products and Versions org.springframework:spring-web in versions 6.1.0 through 6.1.11 6.0.0 through 6.0.22 5.3.0 through 5.3.37 Older, unsupported versions are also affected ### Mitigation Users of affected versions should upgrade to the corresponding fixed version. 6.1.x -> 6.1.12 6.0.x -> 6.0.23 5.3.x -> 5.3.38 No other mitigation steps are necessary. Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter.
5.3.38
Affected by 1 other vulnerability.
6.0.23
Affected by 1 other vulnerability.
6.1.12
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T23:09:24.925779+00:00 GitLab Importer Affected by VCID-x5w8-j62d-m7h6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml 38.4.0
2026-04-16T22:56:00.303849+00:00 GitLab Importer Affected by VCID-5ng1-3a32-cugs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-22262.yml 38.4.0
2026-04-16T22:02:10.039840+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.4.0
2026-04-12T00:27:38.865855+00:00 GitLab Importer Affected by VCID-x5w8-j62d-m7h6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml 38.3.0
2026-04-12T00:14:37.001935+00:00 GitLab Importer Affected by VCID-5ng1-3a32-cugs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-22262.yml 38.3.0
2026-04-11T23:17:47.701133+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.3.0
2026-04-03T00:35:21.470102+00:00 GitLab Importer Affected by VCID-x5w8-j62d-m7h6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml 38.1.0
2026-04-03T00:20:57.496532+00:00 GitLab Importer Affected by VCID-5ng1-3a32-cugs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-22262.yml 38.1.0
2026-04-02T23:25:28.956224+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.1.0
2026-04-01T17:46:15.549669+00:00 GitLab Importer Affected by VCID-kpma-e8rd-b7c8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2016-1000027.yml 38.0.0