GHSA-q2cj-h8fw-q4cc
GitHub Security Advisory
Spring Expression language property modification using Spring Cloud Gateway Server WebFlux
✓ GitHub Reviewed
CRITICAL
Has CVE
Advisory Details
Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification.
An application should be considered vulnerable when all the following are true:
* The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable).
* Spring Boot actuator is a dependency.
* The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway.
* The actuator endpoints are available to attackers.
* The actuator endpoints are unsecured.
Affected Packages
Maven
org.springframework.cloud:spring-cloud-gateway-server-webflux
Affected versions:
3.1.0
(last affected: 3.1.10)
Maven
org.springframework.cloud:spring-cloud-gateway-server-webflux
Affected versions:
4.0.0
(last affected: 4.1.10)
Maven
org.springframework.cloud:spring-cloud-gateway-server-webflux
Affected versions:
4.2.0
(fixed in 4.2.5)
Maven
org.springframework.cloud:spring-cloud-gateway-server-webflux
Affected versions:
4.3.0
(fixed in 4.3.1)
Related CVEs
Key Information
9.0
/10
Dataset
Last updated: September 19, 2025 6:29 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.