GHSA-7cj3-x93g-gj76
GitHub Security Advisory
Signature forgery in Spring Boot's Loader
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Applications that use spring-boot-loader or spring-boot-loader-classic and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another.
Affected Packages
Maven
org.springframework.boot:spring-boot-loader
Affected versions:
2.7.0
(fixed in 2.7.22)
Maven
org.springframework.boot:spring-boot-loader-classic
Affected versions:
2.7.0
(fixed in 2.7.22)
Maven
org.springframework.boot:spring-boot-loader
Affected versions:
3.0.0
(fixed in 3.0.17)
Maven
org.springframework.boot:spring-boot-loader-classic
Affected versions:
3.0.0
(fixed in 3.0.17)
Maven
org.springframework.boot:spring-boot-loader
Affected versions:
3.1.0
(fixed in 3.1.13)
Maven
org.springframework.boot:spring-boot-loader-classic
Affected versions:
3.1.0
(fixed in 3.1.13)
Maven
org.springframework.boot:spring-boot-loader
Affected versions:
3.2.0
(fixed in 3.2.9)
Maven
org.springframework.boot:spring-boot-loader-classic
Affected versions:
3.2.0
(fixed in 3.2.9)
Maven
org.springframework.boot:spring-boot-loader
Affected versions:
3.3.0
(fixed in 3.3.3)
Maven
org.springframework.boot:spring-boot-loader-classic
Affected versions:
3.3.0
(fixed in 3.3.3)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: September 20, 2025 6:29 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.