Impact
The vulnerability in Spring Security allows an attacker to bypass authorization controls because the servlet-path is omitted when computing the path matcher for XML based authorization rules. This flaw means that requests matching the specified pattern are not subjected to the intended access restrictions, potentially enabling unauthorized access to protected resources.
Affected Systems
The flaw affects applications built with Spring Security versions 7.0.0 through 7.0.4. The issue arises when the <sec:intercept-url> element uses a servlet-path attribute (e.g., servlet-path="/servlet-path") in combination with a pattern such as "/endpoint/".
Risk and Exploitability
With a CVSS score of 7.5 the vulnerability poses a high baseline risk. No EPSS score is available and the issue is not currently listed in the CISA KEV catalog. The likely attack vector is through crafted HTTP requests that match the defined pattern, allowing attackers to locate resources that should be protected. The severity and absence of publicly available exploits suggest that the risk is moderate to high and organizations using affected Spring Security versions should prioritize remediation.
OpenCVE Enrichment