GHSA-9qf9-28h9-hqcj
GitHub Security Advisory
Remote code execution in PATCH requests in Spring Data REST
✓ GitHub Reviewed
CRITICAL
Has CVE
Advisory Details
Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) can use specially crafted JSON data to run arbitrary Java code.
Affected Packages
Maven
org.springframework.data:spring-data-rest-core
Affected versions:
0
(fixed in 2.6.9.RELEASE)
Maven
org.springframework.data:spring-data-rest-core
Affected versions:
3.0.0
(fixed in 3.0.1.RELEASE)
Related CVEs
Key Information
9.0
/10
Dataset
Last updated: August 30, 2025 6:32 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.