Loading HuntDB...

GHSA-q2cj-h8fw-q4cc

GitHub Security Advisory

Spring Expression language property modification using Spring Cloud Gateway Server WebFlux

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification.

An application should be considered vulnerable when all the following are true:

* The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable).
* Spring Boot actuator is a dependency.
* The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway.
* The actuator endpoints are available to attackers.
* The actuator endpoints are unsecured.

Affected Packages

Maven org.springframework.cloud:spring-cloud-gateway-server-webflux
Affected versions: 3.1.0 (last affected: 3.1.10)
Maven org.springframework.cloud:spring-cloud-gateway-server-webflux
Affected versions: 4.0.0 (last affected: 4.1.10)
Maven org.springframework.cloud:spring-cloud-gateway-server-webflux
Affected versions: 4.2.0 (fixed in 4.2.5)
Maven org.springframework.cloud:spring-cloud-gateway-server-webflux
Affected versions: 4.3.0 (fixed in 4.3.1)

Related CVEs

Key Information

GHSA ID
GHSA-q2cj-h8fw-q4cc
Published
September 16, 2025 3:32 PM
Last Modified
September 16, 2025 8:20 PM
CVSS Score
9.0 /10
Primary Ecosystem
Maven
Primary Package
org.springframework.cloud:spring-cloud-gateway-server-webflux
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 19, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.