CVE-2025-41243: CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in Spring Cloud Gateway
Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
AI Analysis
Technical Summary
CVE-2025-41243 is a critical vulnerability affecting Spring Cloud Gateway Server Webflux, a component widely used for building API gateways in microservice architectures. The vulnerability stems from improper neutralization of special elements used in Expression Language (EL) statements, classified under CWE-917 (Improper Neutralization of Special Elements used in an Expression Language Statement) and CWE-94 (Improper Control of Generation of Code). Specifically, this flaw allows attackers to manipulate Spring Environment properties via the actuator web endpoints exposed by Spring Cloud Gateway Server Webflux. The vulnerability requires that the application uses Spring Cloud Gateway Server Webflux (not WebMVC), has Spring Boot actuator as a dependency, and that the actuator endpoints are enabled and exposed (management.endpoints.web.exposure.include=gateway) without proper security controls. When these conditions are met, unauthenticated remote attackers can exploit the EL injection to execute arbitrary code or commands, leading to full compromise of the affected system. The CVSS v3.1 base score is 10.0, indicating a critical severity with network attack vector, no required privileges or user interaction, and complete impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the ease of exploitation and the critical impact make this vulnerability a high priority for remediation. Affected versions include Spring Cloud Gateway 3.1.x, 4.0.x, 4.1.x, 4.2.x, and 4.3.x.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for enterprises relying on Spring Cloud Gateway Server Webflux to manage internal and external API traffic. Exploitation can lead to unauthorized access, data breaches involving sensitive personal and business data, service disruption, and potential lateral movement within corporate networks. Given the criticality of the CVSS score and the fact that no authentication is required, attackers can remotely compromise systems, potentially impacting compliance with GDPR and other data protection regulations. The disruption of API gateways could also affect critical business operations, including financial transactions, supply chain communications, and customer-facing services. The risk is amplified in sectors such as finance, healthcare, telecommunications, and government services, where Spring Cloud Gateway is commonly deployed and where data sensitivity and service availability are paramount.
Mitigation Recommendations
Organizations should immediately audit their Spring Cloud Gateway Server Webflux deployments to identify if the actuator endpoints are enabled and exposed without proper security controls. Specifically, verify the 'management.endpoints.web.exposure.include' property and restrict or disable the 'gateway' actuator endpoint if not strictly necessary. Implement strong authentication and authorization mechanisms on all actuator endpoints, preferably integrating with enterprise identity providers and enforcing least privilege access. Upgrade affected Spring Cloud Gateway versions to patched releases once available from the vendor. In the interim, consider network-level protections such as firewall rules or API gateway policies to restrict access to actuator endpoints to trusted internal IPs only. Additionally, monitor logs and network traffic for unusual access patterns targeting actuator endpoints. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with EL injection detection capabilities as an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-41243: CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in Spring Cloud Gateway
Description
Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
AI-Powered Analysis
Technical Analysis
CVE-2025-41243 is a critical vulnerability affecting Spring Cloud Gateway Server Webflux, a component widely used for building API gateways in microservice architectures. The vulnerability stems from improper neutralization of special elements used in Expression Language (EL) statements, classified under CWE-917 (Improper Neutralization of Special Elements used in an Expression Language Statement) and CWE-94 (Improper Control of Generation of Code). Specifically, this flaw allows attackers to manipulate Spring Environment properties via the actuator web endpoints exposed by Spring Cloud Gateway Server Webflux. The vulnerability requires that the application uses Spring Cloud Gateway Server Webflux (not WebMVC), has Spring Boot actuator as a dependency, and that the actuator endpoints are enabled and exposed (management.endpoints.web.exposure.include=gateway) without proper security controls. When these conditions are met, unauthenticated remote attackers can exploit the EL injection to execute arbitrary code or commands, leading to full compromise of the affected system. The CVSS v3.1 base score is 10.0, indicating a critical severity with network attack vector, no required privileges or user interaction, and complete impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the ease of exploitation and the critical impact make this vulnerability a high priority for remediation. Affected versions include Spring Cloud Gateway 3.1.x, 4.0.x, 4.1.x, 4.2.x, and 4.3.x.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for enterprises relying on Spring Cloud Gateway Server Webflux to manage internal and external API traffic. Exploitation can lead to unauthorized access, data breaches involving sensitive personal and business data, service disruption, and potential lateral movement within corporate networks. Given the criticality of the CVSS score and the fact that no authentication is required, attackers can remotely compromise systems, potentially impacting compliance with GDPR and other data protection regulations. The disruption of API gateways could also affect critical business operations, including financial transactions, supply chain communications, and customer-facing services. The risk is amplified in sectors such as finance, healthcare, telecommunications, and government services, where Spring Cloud Gateway is commonly deployed and where data sensitivity and service availability are paramount.
Mitigation Recommendations
Organizations should immediately audit their Spring Cloud Gateway Server Webflux deployments to identify if the actuator endpoints are enabled and exposed without proper security controls. Specifically, verify the 'management.endpoints.web.exposure.include' property and restrict or disable the 'gateway' actuator endpoint if not strictly necessary. Implement strong authentication and authorization mechanisms on all actuator endpoints, preferably integrating with enterprise identity providers and enforcing least privilege access. Upgrade affected Spring Cloud Gateway versions to patched releases once available from the vendor. In the interim, consider network-level protections such as firewall rules or API gateway policies to restrict access to actuator endpoints to trusted internal IPs only. Additionally, monitor logs and network traffic for unusual access patterns targeting actuator endpoints. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with EL injection detection capabilities as an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - vmware
 - Date Reserved
 - 2025-04-16T09:30:17.799Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 68c97badd327290d6e7319cd
Added to database: 9/16/2025, 3:01:01 PM
Last enriched: 9/24/2025, 1:18:46 AM
Last updated: 11/4/2025, 3:43:54 AM
Views: 102
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12324: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tobiasbg TablePress – Tables in WordPress made easy
MediumCVE-2025-43507: An app may be able to fingerprint the user in Apple visionOS
MediumCVE-2025-43505: Processing a maliciously crafted file may lead to heap corruption in Apple Xcode
HighCVE-2025-43504: A user in a privileged network position may be able to cause a denial-of-service in Apple Xcode
MediumCVE-2025-43503: Visiting a malicious website may lead to user interface spoofing in Apple Safari
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.