Description
Vulnerability in Spring Spring Security. Applications that explicitly configure One-Time Token login with JdbcOneTimeTokenService are vulnerable to a Time-of-check Time-of-use (TOCTOU) race condition. This issue affects Spring Security: from 6.4.0 through 6.4.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.
Published: 2026-04-21
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Repeated token authentication
Action: Check updates
AI Analysis

Impact

The vulnerability in Spring Security arises from a time‑of‑check to time‑of‑use race condition in JdbcOneTimeTokenService. When an application enables one‑time token logins, the service does not correctly invalidate a token upon first use, allowing the same token to be reused to establish multiple authenticated sessions. This flaw can enable an attacker who gains or intercepts a one‑time token to create additional sessions beyond the intended single‑use restriction, effectively bypassing the mechanism that was supposed to limit access to one session per token.

Affected Systems

Spring Security versions 6.4.0 through 6.4.15, 6.5.0 through 6.5.9, and 7.0.0 through 7.0.4 are vulnerable. Any Java application that has explicitly configured JdbcOneTimeTokenService for one‑time token logins within those releases may be impacted. The vulnerability is limited to those versions and does not affect earlier or later releases.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate severity based on CVSS v3.1. No EPSS data is available, and the issue is not listed in CISA's KEV catalog, suggesting current exploitation is not widely reported. However, the TOCTOU race condition requires concurrency or timing conditions; an attacker must have access to the one‑time token and the ability to request simultaneous authentication attempts. The risk is thus primarily for environments that expose these tokens insecurely, but the lack of a public exploit and low severity score moderates urgency. Nevertheless, updating to a fixed version remains prudent.

Generated by OpenCVE AI on April 22, 2026 at 05:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Spring Security to a version newer than the vulnerable releases (≥6.4.16, ≥6.5.10, or ≥7.0.5). Official patches address the race condition.
  • If an immediate upgrade is not feasible, disable or remove the One‑Time Token login configuration until the fix is applied, or enforce token invalidation logic manually.
  • Audit and monitor authentication logs for repeated use of a single token and investigate any anomalous activity.

Generated by OpenCVE AI on April 22, 2026 at 05:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring Security
Vendors & Products Spring
Spring spring Security

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Vulnerability in Spring Spring Security. Applications that explicitly configure One-Time Token login with JdbcOneTimeTokenService are vulnerable to a Time-of-check Time-of-use (TOCTOU) race condition. This issue affects Spring Security: from 6.4.0 through 6.4.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.
Title Spring Security JdbcOneTimeTokenService allows a one-time token to authenticate multiple sessions
Weaknesses CWE-367
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Spring Spring Security
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-04-21T18:44:34.841Z

Reserved: 2026-01-09T06:55:03.990Z

Link: CVE-2026-22751

cve-icon Vulnrichment

Updated: 2026-04-21T18:44:13.539Z

cve-icon NVD

Status : Received

Published: 2026-04-21T19:16:16.550

Modified: 2026-04-21T19:16:16.550

Link: CVE-2026-22751

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:45:51Z

Weaknesses