Description
Spring Cloud AWS simplifies using AWS managed services in a Spring and Spring Boot applications. From 3.0.0 to 4.0.1, pplications using Spring Cloud AWS SNS HTTP/HTTPS endpoint support (@NotificationMessageMapping, @NotificationSubscriptionMapping, @NotificationUnsubscribeConfirmationMapping) did not verify the signature of incoming SNS messages. An unauthenticated attacker who knows the endpoint URL could send crafted HTTP POST requests mimicking SNS Notification or SubscriptionConfirmation messages. This vulnerability is fixed in 4.0.2.
Published: 2026-05-14
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in Spring Cloud AWS arose because the library did not verify signatures on incoming Amazon SNS messages sent to HTTP/HTTPS endpoints that use the @NotificationMessageMapping, @NotificationSubscriptionMapping, or @NotificationUnsubscribeConfirmationMapping annotations. An attacker who knows the public endpoint URL could craft HTTP POST requests that mimic valid SNS notifications or subscription confirmations. If an application blindly processes these messages, it could be tricked into executing unintended actions such as triggering downstream services, creating resources, or exposing sensitive data. The issue is identified by CWE‑345, which indicates an absence of data authenticity checks.

Affected Systems

All applications that depend on the Spring Cloud AWS or Spring Cloud AWS SNS libraries between versions 3.0.0 and 4.0.1 are affected. The issue applies to the awspring:spring-cloud-aws package and the io.awspring.cloud:spring-cloud-aws-sns package, as listed by the CNA. Any application instance that hosts an SNS HTTP/HTTPS endpoint using the annotation support covered by these libraries is vulnerable until the fix is applied.

Risk and Exploitability

The CVSS score of 6.3 classifies this flaw as moderate severity. The EPSS score is not available, and it is not yet listed in CISA’s KEV catalog, suggesting no widespread exploitation yet, but the nature of the flaw allows a remote attacker with network access to the endpoint to send forged messages without authentication. Because the attacker only needs knowledge of the endpoint URL and the ability to POST to it, the attack vector is straightforward. The absence of a mitigation such as signature verification increases the likelihood that a crafted message will be accepted, potentially giving the attacker privilege to affect the target application's operation.

Generated by OpenCVE AI on May 14, 2026 at 16:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Spring Cloud AWS dependency to version 4.0.2 or later, which implements signature verification for SNS HTTP/HTTPS endpoints.
  • If an immediate upgrade is not possible, implement custom logic in the notification handling code that validates the SNS message signature before processing the payload.
  • After applying the upgrade or adding signature checks, redeploy the application and test the SNS notification flow to ensure that malformed or unverified messages are rejected.

Generated by OpenCVE AI on May 14, 2026 at 16:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r4w4-wv68-qv85 Spring Cloud AWS missing SNS message signature verification allows spoofing of HTTP/HTTPS endpoint notifications
History

Thu, 14 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description Spring Cloud AWS simplifies using AWS managed services in a Spring and Spring Boot applications. From 3.0.0 to 4.0.1, pplications using Spring Cloud AWS SNS HTTP/HTTPS endpoint support (@NotificationMessageMapping, @NotificationSubscriptionMapping, @NotificationUnsubscribeConfirmationMapping) did not verify the signature of incoming SNS messages. An unauthenticated attacker who knows the endpoint URL could send crafted HTTP POST requests mimicking SNS Notification or SubscriptionConfirmation messages. This vulnerability is fixed in 4.0.2.
Title Spring Cloud AWS: Missing SNS message signature verification allows spoofing of HTTP/HTTPS endpoint notifications
Weaknesses CWE-345
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-14T18:08:49.304Z

Reserved: 2026-05-05T19:00:06.021Z

Link: CVE-2026-44308

cve-icon Vulnrichment

Updated: 2026-05-14T18:08:46.568Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T15:16:47.983

Modified: 2026-05-14T18:19:25.260

Link: CVE-2026-44308

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T16:30:24Z

Weaknesses