Skip to content

spring-boot-starter-web-4.0.4.jar: 20 vulnerabilities (highest severity is: 9.1) #71

@mend-bolt-for-github

Description

@mend-bolt-for-github
Vulnerable Library - spring-boot-starter-web-4.0.4.jar

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/7.0.6/2baeb353efd42374239cc45e8d02780d6c6e7a77/spring-web-7.0.6.jar

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (spring-boot-starter-web version) Remediation Possible**
CVE-2026-43512 Critical 9.1 tomcat-embed-core-11.0.18.jar Transitive N/A*
CVE-2026-40976 Critical 9.1 spring-boot-4.0.4.jar Transitive N/A*
CVE-2026-29145 Critical 9.1 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-34487 High 7.5 tomcat-embed-core-11.0.18.jar Transitive 4.0.6
CVE-2026-34483 High 7.5 tomcat-embed-core-11.0.18.jar Transitive 4.0.6
CVE-2026-29146 High 7.5 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-29129 High 7.5 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-24880 High 7.5 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-40973 High 7.0 spring-boot-4.0.4.jar Transitive 4.0.6
CVE-2026-41293 Medium 6.5 tomcat-embed-core-11.0.18.jar Transitive N/A*
CVE-2026-34500 Medium 6.5 tomcat-embed-core-11.0.18.jar Transitive 4.0.6
CVE-2026-22740 Medium 6.5 spring-web-7.0.6.jar Transitive 4.0.6
CVE-2026-25854 Medium 6.1 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-43513 Medium 5.3 tomcat-embed-core-11.0.18.jar Transitive N/A*
CVE-2026-32990 Medium 5.3 tomcat-embed-core-11.0.18.jar Transitive 4.0.5
CVE-2026-22745 Medium 5.3 spring-webmvc-7.0.6.jar Transitive 4.0.6
CVE-2026-43515 Medium 4.8 tomcat-embed-core-11.0.18.jar Transitive N/A*
CVE-2026-40975 Medium 4.8 spring-boot-4.0.4.jar Transitive 4.0.6
CVE-2026-40977 Medium 4.7 spring-boot-4.0.4.jar Transitive 4.0.6
CVE-2026-22741 Low 3.1 spring-webmvc-7.0.6.jar Transitive 4.0.6

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2026-43512

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

DEPRECATED: Authentication Bypass Issues vulnerability in digest authentication in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from before 7.0.0. Older unsupported versions any also be affect Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.

Publish Date: 2026-05-12

URL: CVE-2026-43512

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-05-12

Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:10.1.55,org.apache.tomcat:tomcat-catalina:11.0.22,org.apache.tomcat.embed:tomcat-embed-core:11.0.22,org.apache.tomcat:tomcat-catalina:9.0.118,org.apache.tomcat:tomcat-catalina:10.1.55,https://github.com/apache/tomcat.git - 10.1.55,https://github.com/apache/tomcat.git - 11.0.22,org.apache.tomcat.embed:tomcat-embed-core:9.0.118,https://github.com/apache/tomcat.git - 9.0.118

Step up your Open Source Security Game with Mend here

CVE-2026-40976

Vulnerable Library - spring-boot-4.0.4.jar

Spring Boot

Library home page: https://spring.io/projects/spring-boot

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework.boot/spring-boot/4.0.4/93d6e7c5b747d640bbad17971c5ce957bee88c5f/spring-boot-4.0.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • spring-boot-web-server-4.0.4.jar
          • spring-boot-4.0.4.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of its own and rely on the default web security filter chain; depend on spring-boot-actuator-autoconfigure; not depend on spring-boot-health. If any of the above does not apply, the application is not vulnerable.
Affected: Spring Boot 4.0.0–4.0.5; upgrade to 4.0.6 or later per vendor advisory.

Publish Date: 2026-04-27

URL: CVE-2026-40976

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-27

Fix Resolution: org.springframework.boot:spring-boot-security:4.0.6,https://github.com/spring-projects/spring-boot.git - v4.0.6

Step up your Open Source Security Game with Mend here

CVE-2026-29145

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.
Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-29145

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-34487

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-34487

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.21

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.6

Step up your Open Source Security Game with Mend here

CVE-2026-34483

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-34483

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.21

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.6

Step up your Open Source Security Game with Mend here

CVE-2026-29146

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.
Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.

Publish Date: 2026-04-09

URL: CVE-2026-29146

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.19

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-29129

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Configured cipher preference order not preserved vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-29129

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-24880

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.
Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-24880

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-40973

Vulnerable Library - spring-boot-4.0.4.jar

Spring Boot

Library home page: https://spring.io/projects/spring-boot

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework.boot/spring-boot/4.0.4/93d6e7c5b747d640bbad17971c5ce957bee88c5f/spring-boot-4.0.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • spring-boot-web-server-4.0.4.jar
          • spring-boot-4.0.4.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

A local attacker on the same host as the application may be able to take control of the directory used by "ApplicationTemp". When "server.servlet.session.persistent" is set to "true" and the attack persists across application restarts, this may allow the attacker to read session information and hijack authenticated users or deploy a gadget chain and execute code as the application's user.
Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); predictable temp directory / "ApplicationTemp" ownership verification. Versions that are no longer supported are also affected per vendor advisory.

Publish Date: 2026-04-27

URL: CVE-2026-40973

CVSS 3 Score Details (7.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-27

Fix Resolution (org.springframework.boot:spring-boot): 4.0.6

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.6

Step up your Open Source Security Game with Mend here

CVE-2026-41293

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Improper Input Validation vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 10.0.0-M1 through 10.0.27.
Older, end of support versions may also be affected.
Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.

Publish Date: 2026-05-12

URL: CVE-2026-41293

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-05-12

Fix Resolution: org.apache.tomcat:tomcat-coyote:9.0.118,https://github.com/apache/tomcat.git - 11.0.22,org.apache.tomcat:tomcat-coyote:11.0.22,org.apache.tomcat:tomcat-coyote:10.1.55,https://github.com/apache/tomcat.git - 10.1.55,org.apache.tomcat.embed:tomcat-embed-core:11.0.22,https://github.com/apache/tomcat.git - 9.0.118,org.apache.tomcat.embed:tomcat-embed-core:10.1.55,org.apache.tomcat.embed:tomcat-embed-core:9.0.118

Step up your Open Source Security Game with Mend here

CVE-2026-34500

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.

Publish Date: 2026-04-09

URL: CVE-2026-34500

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.21

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.6

Step up your Open Source Security Game with Mend here

CVE-2026-22740

Vulnerable Library - spring-web-7.0.6.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/7.0.6/2baeb353efd42374239cc45e8d02780d6c6e7a77/spring-web-7.0.6.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • spring-boot-web-server-4.0.4.jar
          • spring-web-7.0.6.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space.
Older, unsupported versions are also affected.

Publish Date: 2026-04-29

URL: CVE-2026-22740

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://spring.io/security/cve-2026-22740

Release Date: 2026-04-18

Fix Resolution (org.springframework:spring-web): 7.0.7

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.6

Step up your Open Source Security Game with Mend here

CVE-2026-25854

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-25854

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-43513

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Improper Handling of Case Sensitivity vulnerability in LockOutRealm in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109. Older unsupported versions may also be affected. Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.

Publish Date: 2026-05-12

URL: CVE-2026-43513

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-05-12

Fix Resolution: org.apache.tomcat:tomcat-catalina:9.0.118,https://github.com/apache/tomcat.git - 10.1.55,org.apache.tomcat:tomcat-catalina:10.1.55,org.apache.tomcat.embed:tomcat-embed-core:10.1.55,https://github.com/apache/tomcat.git - 9.0.118,https://github.com/apache/tomcat.git - 11.0.22,org.apache.tomcat.embed:tomcat-embed-core:11.0.22,org.apache.tomcat.embed:tomcat-embed-core:9.0.118,org.apache.tomcat:tomcat-catalina:11.0.22

Step up your Open Source Security Game with Mend here

CVE-2026-32990

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.
This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Publish Date: 2026-04-09

URL: CVE-2026-32990

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-09

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 11.0.20

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.5

Step up your Open Source Security Game with Mend here

CVE-2026-22745

Vulnerable Library - spring-webmvc-7.0.6.jar

Spring Web MVC

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-webmvc/7.0.6/da516a887d0fea326c16b07fb2519f7f112f8eda/spring-webmvc-7.0.6.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-webmvc-4.0.4.jar
      • spring-webmvc-7.0.6.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Spring MVC and WebFlux applications are vulnerable to Denial of Service attacks when resolving static resources.
More precisely, an application can be vulnerable when all the following are true:

  • the application is using Spring MVC or Spring WebFlux
  • the application is serving static resources from the file system
  • the application is running on a Windows platform
    When all the conditions above are met, the attacker can send malicious requests that are slow to resolve and that can keep HTTP connections in use. This can cause a Denial of Service on the application.

Publish Date: 2026-04-29

URL: CVE-2026-22745

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-29

Fix Resolution (org.springframework:spring-webmvc): 7.0.7

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.6

Step up your Open Source Security Game with Mend here

CVE-2026-43515

Vulnerable Library - tomcat-embed-core-11.0.18.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/11.0.18/a96bb1b8a21ee7e93ce01cce7fd63f8e7561ec92/tomcat-embed-core-11.0.18.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • tomcat-embed-core-11.0.18.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Improper Authorization vulnerability when multiple method constraints define an HTTP method for the same extension in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109. Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.

Publish Date: 2026-05-12

URL: CVE-2026-43515

CVSS 3 Score Details (4.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-05-12

Fix Resolution: org.apache.tomcat:tomcat-catalina:11.0.22,https://github.com/apache/tomcat.git - 11.0.22,org.apache.tomcat:tomcat-catalina:10.1.55,org.apache.tomcat.embed:tomcat-embed-core:10.1.55,https://github.com/apache/tomcat.git - 10.1.55,org.apache.tomcat.embed:tomcat-embed-core:9.0.118,org.apache.tomcat:tomcat-catalina:9.0.118,org.apache.tomcat.embed:tomcat-embed-core:11.0.22,https://github.com/apache/tomcat.git - 9.0.118

Step up your Open Source Security Game with Mend here

CVE-2026-40975

Vulnerable Library - spring-boot-4.0.4.jar

Spring Boot

Library home page: https://spring.io/projects/spring-boot

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework.boot/spring-boot/4.0.4/93d6e7c5b747d640bbad17971c5ce957bee88c5f/spring-boot-4.0.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • spring-boot-web-server-4.0.4.jar
          • spring-boot-4.0.4.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Values produced by ${random.value} are not suitable for use as secrets. ${random.uuid} is not affected. ${random.int} and ${random.long} should never be used for secrets as they are numeric values with a predictable range.
Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); random value property source / weak PRNG for secrets. Versions that are no longer supported are also affected per vendor advisory.

Publish Date: 2026-04-27

URL: CVE-2026-40975

CVSS 3 Score Details (4.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-27

Fix Resolution (org.springframework.boot:spring-boot): 4.0.6

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.6

Step up your Open Source Security Game with Mend here

CVE-2026-40977

Vulnerable Library - spring-boot-4.0.4.jar

Spring Boot

Library home page: https://spring.io/projects/spring-boot

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework.boot/spring-boot/4.0.4/93d6e7c5b747d640bbad17971c5ce957bee88c5f/spring-boot-4.0.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-starter-tomcat-4.0.4.jar
      • spring-boot-starter-tomcat-runtime-4.0.4.jar
        • spring-boot-web-server-4.0.4.jar
          • spring-boot-4.0.4.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

When an application is configured to use "ApplicationPidFileWriter", a local attacker with write access to the PID file's location can corrupt one file on the host each time the application is started.
Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); PID file / symlink behavior ("ApplicationPidFileWriter"). Versions that are no longer supported are also affected per vendor advisory.

Publish Date: 2026-04-27

URL: CVE-2026-40977

CVSS 3 Score Details (4.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-04-27

Fix Resolution (org.springframework.boot:spring-boot): 4.0.6

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.6

Step up your Open Source Security Game with Mend here

CVE-2026-22741

Vulnerable Library - spring-webmvc-7.0.6.jar

Spring Web MVC

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /build.gradle.kts

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.springframework/spring-webmvc/7.0.6/da516a887d0fea326c16b07fb2519f7f112f8eda/spring-webmvc-7.0.6.jar

Dependency Hierarchy:

  • spring-boot-starter-web-4.0.4.jar (Root Library)
    • spring-boot-webmvc-4.0.4.jar
      • spring-webmvc-7.0.6.jar (Vulnerable Library)

Found in HEAD commit: 9200939ed00ea9c0f2341f87024dc603fe2b491c

Found in base branch: master

Vulnerability Details

Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources.
More precisely, an application can be vulnerable when all the following are true:

  • the application is using Spring MVC or Spring WebFlux
  • the application is configuring the  resource chain support https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-config/static-resources.html#page-title  with caching enabled
  • the application adds support for encoded resources resolution
  • the resource cache must be empty when the attacker has access to the application
    When all the conditions above are met, the attacker can send malicious requests and poison the resource cache with resources using the wrong encoding. This can cause a denial of service by breaking the front-end application for clients.

Publish Date: 2026-04-29

URL: CVE-2026-22741

CVSS 3 Score Details (3.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://spring.io/security/cve-2026-22741

Release Date: 2026-04-18

Fix Resolution (org.springframework:spring-webmvc): 7.0.7

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.6

Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions