Description
Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under the path used by the CloudFoundry Actuator endpoints. This issue affects Spring Security: from 4.0.0 through 4.0.3, from 3.5.0 through 3.5.11, from 3.4.0 through 3.4.14, from 3.3.0 through 3.3.17, from 2.7.0 through 2.7.31.
Published: 2026-03-19
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Update
AI Analysis

Impact

A Spring Boot application that exposes Actuator can be vulnerable to an Authentication Bypass when an endpoint that requires authentication is declared under the same path used by the CloudFoundry Actuator endpoints. The vulnerability allows an attacker to access protected resources without providing proper credentials. The weakness is divided under CWE-288, Authentication Failure.

Affected Systems

Spring Security versions affected are: 4.0.0 through 4.0.3, 3.5.0 through 3.5.11, 3.4.0 through 3.4.14, 3.3.0 through 3.3.17, and 2.7.0 through 2.7.31. Any Spring Boot application using these Spring Security releases and enabling Actuator with CloudFoundry endpoints is at risk.

Risk and Exploitability

The CVSS score of 8.2 indicates high severity. EPSS score is not available, and the vulnerability is not listed in CISA KEV catalog. The likely attack vector is a remote authenticated or unauthenticated request to the attacker-controlled endpoint path; the omission of the attack vector in the official description means it is inferred that a remote attacker can trigger the bypass by sending requests to the affected path. Exploitation requires sending a request to the vulnerable Actuator path and successfully retrieving restricted data without authentication, a condition that the vulnerability directly satisfies.

Generated by OpenCVE AI on March 20, 2026 at 00:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Spring Security to a release after the affected ranges (e.g., 4.0.4 or later, or 3.5.12 or later).
  • If upgrading is not immediately possible, isolate or remove Actuator CloudFoundry endpoints from the application’s exposed URLs.

Generated by OpenCVE AI on March 20, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mgvc-8q2h-5pgc Spring Boot has an Authentication Bypass under Actuator CloudFoundry endpoints
References
History

Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring Security
Vendors & Products Spring
Spring spring Security

Thu, 19 Mar 2026 23:45:00 +0000

Type Values Removed Values Added
Description Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under the path used by the CloudFoundry Actuator endpoints. This issue affects Spring Security: from 4.0.0 through 4.0.3, from 3.5.0 through 3.5.11, from 3.4.0 through 3.4.14, from 3.3.0 through 3.3.17, from 2.7.0 through 2.7.31.
Title Authentication Bypass under Actuator CloudFoundry endpoints
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

Spring Spring Security
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-03-20T14:45:18.731Z

Reserved: 2026-01-09T06:54:41.498Z

Link: CVE-2026-22733

cve-icon Vulnrichment

Updated: 2026-03-20T14:45:14.474Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T00:16:15.513

Modified: 2026-03-20T13:37:50.737

Link: CVE-2026-22733

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T10:43:44Z

Weaknesses