Skip to content

spring-boot-starter-web-3.5.5.jar: 17 vulnerabilities (highest severity is: 9.6) #234

@mend-bolt-for-github

Description

@mend-bolt-for-github
Vulnerable Library - spring-boot-starter-web-3.5.5.jar

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (spring-boot-starter-web version) Remediation Possible**
CVE-2025-55754 Critical 9.6 tomcat-embed-core-10.1.44.jar Transitive 3.5.6
CVE-2026-29145 Critical 9.1 tomcat-embed-core-10.1.44.jar Transitive 3.5.13
CVE-2025-66614 High 7.6 tomcat-embed-core-10.1.44.jar Transitive 3.5.9
CVE-2026-34487 High 7.5 tomcat-embed-core-10.1.44.jar Transitive 4.0.0
CVE-2026-34483 High 7.5 tomcat-embed-core-10.1.44.jar Transitive 4.0.0
CVE-2026-29146 High 7.5 tomcat-embed-core-10.1.44.jar Transitive 3.5.13
CVE-2026-24880 High 7.5 tomcat-embed-core-10.1.44.jar Transitive 3.5.13
CVE-2025-55752 High 7.5 tomcat-embed-core-10.1.44.jar Transitive 3.5.6
CVE-2026-24734 High 7.4 tomcat-embed-core-10.1.44.jar Transitive 3.5.11
CVE-2026-34500 Medium 6.5 tomcat-embed-core-10.1.44.jar Transitive 4.0.0
CVE-2026-24733 Medium 6.5 tomcat-embed-core-10.1.44.jar Transitive 3.5.9
CVE-2026-22740 Medium 6.5 spring-web-6.2.10.jar Transitive 4.0.0
CVE-2026-25854 Medium 6.1 tomcat-embed-core-10.1.44.jar Transitive 3.5.13
CVE-2026-22737 Medium 5.9 spring-webmvc-6.2.10.jar Transitive N/A*
CVE-2025-61795 Medium 5.3 tomcat-embed-core-10.1.44.jar Transitive N/A*
CVE-2026-22741 Low 3.1 spring-webmvc-6.2.10.jar Transitive 4.0.0
CVE-2026-22735 Low 2.6 detected in multiple dependencies Transitive 3.5.12

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2025-55754

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.

Publish Date: 2025-10-27

URL: CVE-2025-55754

CVSS 3 Score Details (9.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://lists.apache.org/thread/j7w54hqbkfcn0xb9xy0wnx8w5nymcbqd

Release Date: 2025-10-27

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.45

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.6

Step up your Open Source Security Game with Mend here

CVE-2026-29145

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.
Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-29145

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13

Step up your Open Source Security Game with Mend here

CVE-2025-66614

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Improper Input Validation vulnerability.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.
Tomcat did not validate that the host name provided via the SNI
extension was the same as the host name provided in the HTTP host header
field. If Tomcat was configured with more than one virtual host and the
TLS configuration for one of those hosts did not require client
certificate authentication but another one did, it was possible for a
client to bypass the client certificate authentication by sending
different host names in the SNI extension and the HTTP host header field.
The vulnerability only applies if client certificate authentication is
only enforced at the Connector. It does not apply if client certificate
authentication is enforced at the web application.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.

Publish Date: 2026-02-17

URL: CVE-2025-66614

CVSS 3 Score Details (7.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7

Release Date: 2026-02-17

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.50

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.9

Step up your Open Source Security Game with Mend here

CVE-2026-34487

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-34487

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.54

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0

Step up your Open Source Security Game with Mend here

CVE-2026-34483

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-34483

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.54

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0

Step up your Open Source Security Game with Mend here

CVE-2026-29146

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.
Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.

Publish Date: 2026-04-09

URL: CVE-2026-29146

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13

Step up your Open Source Security Game with Mend here

CVE-2026-24880

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.
Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-24880

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13

Step up your Open Source Security Game with Mend here

CVE-2025-55752

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.

Publish Date: 2025-10-27

URL: CVE-2025-55752

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2025-10-27

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.45

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.6

Step up your Open Source Security Game with Mend here

CVE-2026-24734

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.
When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.
This issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114.
The following versions were EOL at the time the CVE was created but are
known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected.
Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue.
Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.

Publish Date: 2026-02-17

URL: CVE-2026-24734

CVSS 3 Score Details (7.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://lists.apache.org/thread/292dlmx3fz1888v6v16221kpozq56gml

Release Date: 2026-02-17

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.52

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.11

Step up your Open Source Security Game with Mend here

CVE-2026-34500

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.

Publish Date: 2026-04-09

URL: CVE-2026-34500

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.54

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0

Step up your Open Source Security Game with Mend here

CVE-2026-24733

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but deny GET
requests, the user could bypass that constraint on GET requests by
sending a (specification invalid) HEAD request using HTTP/0.9.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.
Older, EOL versions are also affected.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.

Publish Date: 2026-02-17

URL: CVE-2026-24733

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-02-17

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.50

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.9

Step up your Open Source Security Game with Mend here

CVE-2026-22740

Vulnerable Library - spring-web-6.2.10.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-json-3.5.5.jar
      • spring-web-6.2.10.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space.

Publish Date: 2026-04-18

URL: CVE-2026-22740

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://spring.io/security/cve-2026-22740

Release Date: 2026-04-18

Fix Resolution (org.springframework:spring-web): 6.2.18

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0

Step up your Open Source Security Game with Mend here

CVE-2026-25854

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-25854

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13

Step up your Open Source Security Game with Mend here

CVE-2026-22737

Vulnerable Library - spring-webmvc-6.2.10.jar

Spring Web MVC

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-webmvc-6.2.10.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Use of Java scripting engine enabled (e.g. JRuby, Jython) template views in Spring MVC and Spring WebFlux applications can result in disclosure of content from files outside the configured locations for script template views. This issue affects Spring Framework: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.

Publish Date: 2026-03-19

URL: CVE-2026-22737

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://spring.io/security/cve-2026-22737

Release Date: 2026-03-19

Fix Resolution: org.springframework:spring-webflux:6.2.17,org.springframework:spring-webflux:7.0.6,https://github.com/spring-projects/spring-framework.git - v7.0.6

Step up your Open Source Security Game with Mend here

CVE-2025-61795

Vulnerable Library - tomcat-embed-core-10.1.44.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-tomcat-3.5.5.jar
      • tomcat-embed-core-10.1.44.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.

Publish Date: 2025-10-27

URL: CVE-2025-61795

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://lists.apache.org/thread/wm9mx8brmx9g4zpywm06ryrtvd3160pp

Release Date: 2025-10-27

Fix Resolution: org.apache.tomcat:tomcat-catalina:11.0.12,org.apache.tomcat:tomcat-catalina:9.0.110,org.apache.tomcat:tomcat-catalina:10.1.47,org.apache.tomcat.embed:tomcat-embed-core:11.0.12,org.apache.tomcat.embed:tomcat-embed-core:9.0.110

Step up your Open Source Security Game with Mend here

CVE-2026-22741

Vulnerable Library - spring-webmvc-6.2.10.jar

Spring Web MVC

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-webmvc-6.2.10.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources.

More precisely, an application can be vulnerable when all the following are true:

the application is using Spring MVC or Spring WebFlux
the application is configuring the resource chain support with caching enabled
the application adds support for encoded resources resolution
the resource cache must be empty when the attacker has access to the application
When all the conditions above are met, the attacker can send malicious requests and poison the resource cache with resources using the wrong encoding. This can cause a denial of service by breaking the front-end application for clients.

Publish Date: 2026-04-18

URL: CVE-2026-22741

CVSS 3 Score Details (3.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://spring.io/security/cve-2026-22741

Release Date: 2026-04-18

Fix Resolution (org.springframework:spring-webmvc): 6.2.18

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0

Step up your Open Source Security Game with Mend here

CVE-2026-22735

Vulnerable Libraries - spring-web-6.2.10.jar, spring-webmvc-6.2.10.jar

spring-web-6.2.10.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-boot-starter-json-3.5.5.jar
      • spring-web-6.2.10.jar (Vulnerable Library)

spring-webmvc-6.2.10.jar

Spring Web MVC

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • spring-boot-starter-web-3.5.5.jar (Root Library)
    • spring-webmvc-6.2.10.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Spring MVC and WebFlux applications are vulnerable to stream corruption when using Server-Sent Events (SSE). This issue affects Spring Foundation: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.

Publish Date: 2026-03-19

URL: CVE-2026-22735

CVSS 3 Score Details (2.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://spring.io/security/cve-2026-22735

Release Date: 2026-03-19

Fix Resolution (org.springframework:spring-web): 6.2.17

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.12

Fix Resolution (org.springframework:spring-webmvc): 6.2.17

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.12

Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions