Loading HuntDB...

GHSA-c4q5-6c82-3qpw

GitHub Security Advisory

Spring Security vulnerable to Authorization Bypass of Static Resources in WebFlux Applications

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

Spring WebFlux applications that have Spring Security authorization rules on static resources can be bypassed under certain circumstances.

For this to impact an application, all of the following must be true:

* It must be a WebFlux application
* It must be using Spring's static resources support
* It must have a non-permitAll authorization rule applied to the static resources support

Affected Packages

Maven org.springframework.security:spring-security-web
Affected versions: 0 (fixed in 5.7.13)
Maven org.springframework.security:spring-security-web
Affected versions: 5.8.0 (fixed in 5.8.15)
Maven org.springframework.security:spring-security-web
Affected versions: 6.2.0 (fixed in 6.2.7)
Maven org.springframework.security:spring-security-web
Affected versions: 6.0.0 (fixed in 6.0.13)
Maven org.springframework.security:spring-security-web
Affected versions: 6.1.0 (fixed in 6.1.11)
Maven org.springframework.security:spring-security-web
Affected versions: 6.3.0 (fixed in 6.3.4)

Related CVEs

Key Information

GHSA ID
GHSA-c4q5-6c82-3qpw
Published
October 28, 2024 9:30 AM
Last Modified
January 24, 2025 9:31 PM
CVSS Score
9.0 /10
Primary Ecosystem
Maven
Primary Package
org.springframework.security:spring-security-web
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 29, 2025 6:37 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.