Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41243: CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in Spring Cloud Gateway

0
Critical
VulnerabilityCVE-2025-41243cvecve-2025-41243cwe-917cwe-94
Published: Tue Sep 16 2025 (09/16/2025, 14:54:57 UTC)
Source: CVE Database V5
Vendor/Project: Spring
Product: Cloud Gateway

Description

Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:01:35 UTC

Technical Analysis

CVE-2025-41243 is a critical vulnerability classified under CWE-917 (Improper Neutralization of Special Elements used in an Expression Language Statement) and CWE-94 (Improper Control of Generation of Code). It affects Spring Cloud Gateway Server Webflux versions 3.1.x through 4.3.x when the Spring Boot actuator dependency is present and the gateway actuator web endpoint is enabled and exposed to attackers without authentication. The vulnerability arises because the actuator endpoints allow unauthenticated users to inject malicious Expression Language (EL) statements, enabling them to modify Spring Environment properties dynamically. This can lead to remote code execution, configuration manipulation, and full system compromise. The vulnerability does not affect Spring Cloud Gateway Server WebMVC. The CVSS v3.1 base score is 10.0, reflecting its critical severity with network attack vector, no required privileges or user interaction, and complete impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the ease of exploitation and potential impact make this a highly critical threat. The vulnerability was reserved in April 2025 and published in September 2025. The lack of available patches at the time of reporting increases the urgency for mitigations such as disabling or securing actuator endpoints.

Potential Impact

The impact of CVE-2025-41243 is severe and far-reaching. Exploitation allows attackers to remotely execute arbitrary code or commands by injecting malicious expressions into the Spring Environment, leading to full system compromise. This can result in data breaches, service disruption, unauthorized access to sensitive configuration data, and potential lateral movement within enterprise networks. Organizations relying on Spring Cloud Gateway Server Webflux for API routing and microservice communication are at risk of having their infrastructure compromised, which can affect business continuity and data integrity. The vulnerability's criticality is heightened by the fact that it requires no authentication or user interaction and can be exploited remotely over the network. This makes it a prime target for attackers aiming to compromise cloud-native applications and services. The exposure of actuator endpoints without proper security controls significantly increases the attack surface. Industries such as finance, healthcare, telecommunications, and government agencies that use Spring Cloud Gateway extensively could face significant operational and reputational damage if exploited.

Mitigation Recommendations

To mitigate CVE-2025-41243, organizations should immediately audit their Spring Cloud Gateway Server Webflux deployments to identify if the actuator endpoints are enabled and exposed. Specifically, verify if management.endpoints.web.exposure.include includes 'gateway' and whether these endpoints are accessible without authentication. If so, restrict access to actuator endpoints using network-level controls such as firewalls or VPNs, and enable authentication and authorization mechanisms for actuator endpoints. Disable the gateway actuator endpoint if it is not required. Monitor logs for suspicious access attempts to actuator endpoints. Apply the latest patches or updates from the Spring project as soon as they become available. Additionally, implement runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with rules to detect and block Expression Language injection attempts. Conduct regular security assessments and penetration testing focused on actuator endpoint exposure. Educate developers and DevOps teams about the risks of exposing actuator endpoints in production environments. Finally, consider adopting a zero-trust approach to internal service communications to limit the impact of any potential compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
vmware
Date Reserved
2025-04-16T09:30:17.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c97badd327290d6e7319cd

Added to database: 9/16/2025, 3:01:01 PM

Last enriched: 2/27/2026, 2:01:35 AM

Last updated: 3/25/2026, 9:16:16 PM

Views: 218

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses