We found results for “”
CVE-2025-22235
Good to know:
Date: April 28, 2025
EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed. Your application may be affected by this if all the following conditions are met: * You use Spring Security * EndpointRequest.to() has been used in a Spring Security chain configuration * The endpoint which EndpointRequest references is disabled or not exposed via web * Your application handles requests to /null and this path needs protection You are not affected if any of the following is true: * You don't use Spring Security * You don't use EndpointRequest.to() * The endpoint which EndpointRequest.to() refers to is enabled and is exposed * Your application does not handle requests to /null or this path does not need protection
Severity Score
Related Resources (6)
Severity Score
Top Fix
Upgrade Version
Upgrade to version org.springframework.boot:spring-boot-actuator-autoconfigure:3.3.11;org.springframework.boot:spring-boot-actuator-autoconfigure:3.4.5;org.springframework.boot:spring-boot:3.3.11;org.springframework.boot:spring-boot:3.4.5;https://github.com/spring-projects/spring-boot.git - v3.3.11;https://github.com/spring-projects/spring-boot.git - v3.4.5
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


