In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3gx9-37ww-9qw6 Spring Cloud Gateway vulnerable to Code Injection when Gateway Actuator endpoint enabled, exposed, unsecured
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.94474}

epss

{'score': 0.94495}


Wed, 29 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-05-16'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2025-07-30T01:37:46.934Z

Reserved: 2022-01-10T00:00:00.000Z

Link: CVE-2022-22947

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:42.449Z

cve-icon NVD

Status : Analyzed

Published: 2022-03-03T22:15:08.673

Modified: 2025-03-13T15:40:47.357

Link: CVE-2022-22947

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.