CVE-2026-22746

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/04/2026
Last modified:
24/04/2026

Description

Vulnerability in Spring Spring Security. If an application is using the UserDetails#isEnabled, #isAccountNonExpired, or #isAccountNonLocked user attributes, to enable, expire, or lock users, then DaoAuthenticationProvider's timing attack defense can be bypassed for users who are disabled, expired, or locked.This issue affects Spring Security: from 5.7.0 through 5.7.22, from 5.8.0 through 5.8.24, from 6.3.0 through 6.3.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* 5.7.23 (excluding)
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* 5.8.0 (including) 5.8.25 (excluding)
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* 6.3.0 (including) 6.3.16 (excluding)
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* 6.4.0 (including) 6.4.16 (excluding)
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* 6.5.0 (including) 6.5.10 (excluding)
cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* 7.0.0 (including) 7.0.5 (excluding)


References to Advisories, Solutions, and Tools