Description
When using Google Secrets Manager as a backend for the Spring Cloud Config server a client can craft a request to the config server potentially exposing secrets from unintended GCP projects.
Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.
Published: 2026-05-07
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A crafted request to the Spring Cloud Config server, when configured with Google Secrets Manager, can expose secrets from unintended Google Cloud Platform projects. The vulnerability stems from insufficient authorization checks, allowing an attacker to request data tied to other projects and obtain sensitive credentials. The exposed information includes service account keys, passwords, and other secrets that could be leveraged for further compromise. The weakness aligns with CWE-639, Authorization Bypass Through User‑Controlled Key. The likely attack vector is a crafted request from a client possessing network access to the Config server.

Affected Systems

Spring Cloud Config from the Spring vendor is affected. Versions 3.1.0 through 3.1.13, 4.1.0 through 4.1.9, 4.2.0 through 4.2.6, 4.3.0 through 4.3.2, and 5.0.0 through 5.0.2 all allow this exploitation. Non‑affected releases begin with 3.1.14, 4.1.10, 4.2.7, 4.3.3, and 5.0.3 respectively. Upgrading to the latest supported patch level prevents secret exposure.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity risk. No EPSS score is available to quantify exploitation probability, and the vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been widely exploited. Nonetheless, based on the description, the likely attack vector is remote and can be performed by a client with network access to the config server, potentially from an internal or compromised machine. Because secrets are exposed, the impact on confidentiality is significant; an attacker could use the data for lateral movement or to impersonate services.

Generated by OpenCVE AI on May 7, 2026 at 05:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Spring Cloud Config to a non‑affected version (3.1.14+ or higher, 4.1.10+ or higher, 4.2.7+ or higher, 4.3.3+ or higher, or 5.0.3+).
  • Restrict network access to the config server so only trusted clients can communicate with it—use firewalls or VPNs to isolate the service from public exposure.
  • Review and tighten IAM permissions for Google Secrets Manager so only the intended projects and services can access secrets, and verify that the config server references the correct project ID.

Generated by OpenCVE AI on May 7, 2026 at 05:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 07 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 06:15:00 +0000

Type Values Removed Values Added
Title Spring Cloud Config Google Secrets Manager Backend Allows Exposure of Secrets from Unintended GCP Projects

Thu, 07 May 2026 04:15:00 +0000

Type Values Removed Values Added
Description When using Google Secrets Manager as a backend for the Spring Cloud Config server a client can craft a request to the config server potentially exposing secrets from unintended GCP projects. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-05-07T12:57:35.373Z

Reserved: 2026-04-16T02:19:04.616Z

Link: CVE-2026-40981

cve-icon Vulnrichment

Updated: 2026-05-07T12:57:29.249Z

cve-icon NVD

Status : Received

Published: 2026-05-07T04:16:24.607

Modified: 2026-05-07T04:16:24.607

Link: CVE-2026-40981

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T06:00:16Z

Weaknesses