CVE-2026-22741

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/04/2026
Last modified:
04/05/2026

Description

Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources.<br /> <br /> <br /> More precisely, an application can be vulnerable when all the following are true:<br /> <br /> * the application is using Spring MVC or Spring WebFlux<br /> * the application is configuring the  resource chain support https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-config/static-resources.html#page-title  with caching enabled<br /> * the application adds support for encoded resources resolution<br /> * the resource cache must be empty when the attacker has access to the application<br /> <br /> <br /> When all the conditions above are met, the attacker can send malicious requests and poison the resource cache with resources using the wrong encoding. This can cause a denial of service by breaking the front-end application for clients.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* 5.3.48 (excluding)
cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* 6.1.0 (including) 6.1.27 (excluding)
cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* 6.2.0 (including) 6.2.18 (excluding)
cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* 7.0.0 (including) 7.0.7 (excluding)