Description
Vulnerability in Spring Spring Security. SubjectX500PrincipalExtractor does not correctly handle certain malformed X.509 certificate CN values, which can lead to reading the wrong value for the username. In a carefully crafted certificate, this can lead to an attacker impersonating another user.
This issue affects Spring Security: from 7.0.0 through 7.0.4.
Published: 2026-04-22
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized User Impersonation
Action: Apply Patch
AI Analysis

Impact

Spring Security’s SubjectX500PrincipalExtractor does not handle certain malformed X.509 certificate CN values correctly, causing the wrong value to be interpreted as the authenticated username. A crafted certificate can therefore allow an attacker to impersonate another user for whom a valid certificate is not required.

Affected Systems

Spring Security from version 7.0.0 through 7.0.4.

Risk and Exploitability

The vulnerability has a CVSS score of 6.8, and an EPSS score of < 1%, indicating a very low probability of exploitation, and it is not listed in the CISA KEV catalog. Exploitation requires an application that accepts X.509 client certificates; the attacker would need to supply a specially crafted certificate, and if successful the victim’s session would be bound to the forged identity, granting access to resources normally denied.

Generated by OpenCVE AI on April 28, 2026 at 21:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the version of Spring Security that contains the patch for this certificate parsing issue, as released by the vendor
  • If upgrading cannot be performed immediately, disable X.509 client certificate authentication in the affected application until a patch is applied
  • Add custom validation to the X.509 certificate’s CN field before it is used for authentication to mitigate the flaw

Generated by OpenCVE AI on April 28, 2026 at 21:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2jrg-rf5x-568g Spring Security Vulnerable to Unauthorized User Impersonation when Using X.509 Client Certificates
History

Tue, 28 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
CWE-374

Tue, 28 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-295
References
Metrics threat_severity

None

threat_severity

Important


Fri, 24 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Vmware
Vmware spring Security
CPEs cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*
Vendors & Products Vmware
Vmware spring Security

Wed, 22 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-297
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring Security
Vendors & Products Spring
Spring spring Security

Wed, 22 Apr 2026 07:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
CWE-374

Wed, 22 Apr 2026 05:45:00 +0000

Type Values Removed Values Added
Description Vulnerability in Spring Spring Security. SubjectX500PrincipalExtractor does not correctly handle certain malformed X.509 certificate CN values, which can lead to reading the wrong value for the username. In a carefully crafted certificate, this can lead to an attacker impersonating another user. This issue affects Spring Security: from 7.0.0 through 7.0.4.
Title Unauthorized User Impersonation when Using X.509 Client Certificates
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Spring Spring Security
Vmware Spring Security
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-04-23T03:56:11.308Z

Reserved: 2026-01-09T06:55:03.990Z

Link: CVE-2026-22747

cve-icon Vulnrichment

Updated: 2026-04-22T15:52:52.728Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T06:16:03.933

Modified: 2026-04-24T14:18:56.417

Link: CVE-2026-22747

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-22T05:08:41Z

Links: CVE-2026-22747 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T21:30:26Z

Weaknesses