GHSA-hgjh-9rj2-g67j
GitHub Security Advisory
Spring Framework URL Parsing with Host Validation Vulnerability
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Applications that use UriComponentsBuilder in Spring Framework to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22243 https://spring.io/security/cve-2024-22243, but with different input.
Affected Packages
Maven
org.springframework:spring-web
Affected versions:
6.1.0
(fixed in 6.1.5)
Maven
org.springframework:spring-web
Affected versions:
6.0.0
(fixed in 6.0.18)
Maven
org.springframework:spring-web
Affected versions:
0
(fixed in 5.3.33)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: September 18, 2025 6:29 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.