Description
The base directory (`spring.cloud.config.server.git.basedir`) used by the Spring Cloud Config Server to clone Git repositories to is susceptible to time-of-check-time-of-use (TOCTOU) attacks.
Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.
Published: 2026-05-07
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Spring Cloud Config Server uses the configuration property spring.cloud.config.server.git.basedir to clone Git repositories. The default behavior is vulnerable to a time‑of‑check‑time‑of‑use flaw, allowing an attacker to manipulate the base directory and cause the server to clone repositories into arbitrary locations. This flaw can enable attackers to read, modify, or execute files outside the intended configuration directory, as inferred from the nature of the TOCTOU vulnerability, potentially leading to unauthorized data access or code execution. The weakness aligns with CWE‑367, a classic TOCTOU scenario.

Affected Systems

The vulnerability affects all releases of Spring Cloud Config across versions 3.1.x (3.1.0 through 3.1.13), 4.1.x (4.1.0 through 4.1.9), 4.2.x (4.2.0 through 4.2.6), 4.3.x (4.3.0 through 4.3.2), and 5.0.x (5.0.0 through 5.0.2). For each series, upgrading to the indicated non‑affected release (e.g., 3.1.14, 4.1.10, 4.2.7, 4.3.3, or 5.0.3) mitigates the issue.

Risk and Exploitability

The CVSS base score of 7.4 classifies this flaw as high severity. Although an EPSS score is not available, the absence of an EPSS entry does not preclude exploitation; the flaw remains publicly known through Spring’s advisory. It is not currently listed in the CISA KEV catalog. The most likely attack path involves a remote actor instructing the Config Server to clone a Git repository via a crafted URL, leveraging the TOCTOU to redirect the clone into privileged or sensitive filesystem locations. Successful exploitation would grant the attacker unauthorized read/write access to arbitrary files on the Config Server host, as inferred from the potential misuse of the clone location.

Generated by OpenCVE AI on May 7, 2026 at 05:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Spring Cloud Config to a non‑affected release (e.g., 3.1.14, 4.1.10, 4.2.7, 4.3.3, or 5.0.3).
  • Restrict filesystem permissions on the configured spring.cloud.config.server.git.basedir to prevent traversal beyond its intended scope.
  • Enable logging and monitor for anomalous Git clone operations, especially those involving high‑privilege paths.

Generated by OpenCVE AI on May 7, 2026 at 05:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring Cloud Config
Vendors & Products Spring
Spring spring Cloud Config

Thu, 07 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 07 May 2026 06:15:00 +0000

Type Values Removed Values Added
Title TOCTOU Directory Traversal in Spring Cloud Config Server Git Cloning

Thu, 07 May 2026 04:15:00 +0000

Type Values Removed Values Added
Description The base directory (`spring.cloud.config.server.git.basedir`) used by the Spring Cloud Config Server to clone Git repositories to is susceptible to time-of-check-time-of-use (TOCTOU) attacks. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.
Weaknesses CWE-367
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}


Subscriptions

Spring Spring Cloud Config
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-05-07T12:57:01.324Z

Reserved: 2026-04-16T02:19:12.970Z

Link: CVE-2026-41002

cve-icon Vulnrichment

Updated: 2026-05-07T12:56:58.308Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T04:16:25.707

Modified: 2026-05-07T14:56:04.523

Link: CVE-2026-41002

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T21:25:08Z

Weaknesses