CVE-2025-41243: CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in Spring Cloud Gateway
Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
AI Analysis
Technical Summary
CVE-2025-41243 is a critical vulnerability classified under CWE-917 (Improper Neutralization of Special Elements used in an Expression Language Statement) and CWE-94 (Improper Control of Generation of Code). It affects Spring Cloud Gateway Server Webflux versions 3.1.x through 4.3.x when the Spring Boot actuator dependency is present and the gateway actuator web endpoint is enabled and exposed to attackers without authentication. The vulnerability arises because the actuator endpoints allow unauthenticated users to inject malicious Expression Language (EL) statements, enabling them to modify Spring Environment properties dynamically. This can lead to remote code execution, configuration manipulation, and full system compromise. The vulnerability does not affect Spring Cloud Gateway Server WebMVC. The CVSS v3.1 base score is 10.0, reflecting its critical severity with network attack vector, no required privileges or user interaction, and complete impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the ease of exploitation and potential impact make this a highly critical threat. The vulnerability was reserved in April 2025 and published in September 2025. The lack of available patches at the time of reporting increases the urgency for mitigations such as disabling or securing actuator endpoints.
Potential Impact
The impact of CVE-2025-41243 is severe and far-reaching. Exploitation allows attackers to remotely execute arbitrary code or commands by injecting malicious expressions into the Spring Environment, leading to full system compromise. This can result in data breaches, service disruption, unauthorized access to sensitive configuration data, and potential lateral movement within enterprise networks. Organizations relying on Spring Cloud Gateway Server Webflux for API routing and microservice communication are at risk of having their infrastructure compromised, which can affect business continuity and data integrity. The vulnerability's criticality is heightened by the fact that it requires no authentication or user interaction and can be exploited remotely over the network. This makes it a prime target for attackers aiming to compromise cloud-native applications and services. The exposure of actuator endpoints without proper security controls significantly increases the attack surface. Industries such as finance, healthcare, telecommunications, and government agencies that use Spring Cloud Gateway extensively could face significant operational and reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2025-41243, organizations should immediately audit their Spring Cloud Gateway Server Webflux deployments to identify if the actuator endpoints are enabled and exposed. Specifically, verify if management.endpoints.web.exposure.include includes 'gateway' and whether these endpoints are accessible without authentication. If so, restrict access to actuator endpoints using network-level controls such as firewalls or VPNs, and enable authentication and authorization mechanisms for actuator endpoints. Disable the gateway actuator endpoint if it is not required. Monitor logs for suspicious access attempts to actuator endpoints. Apply the latest patches or updates from the Spring project as soon as they become available. Additionally, implement runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with rules to detect and block Expression Language injection attempts. Conduct regular security assessments and penetration testing focused on actuator endpoint exposure. Educate developers and DevOps teams about the risks of exposing actuator endpoints in production environments. Finally, consider adopting a zero-trust approach to internal service communications to limit the impact of any potential compromise.
Affected Countries
United States, Germany, United Kingdom, India, Japan, South Korea, France, Canada, Australia, Netherlands, Singapore
CVE-2025-41243: CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in Spring Cloud Gateway
Description
Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-41243 is a critical vulnerability classified under CWE-917 (Improper Neutralization of Special Elements used in an Expression Language Statement) and CWE-94 (Improper Control of Generation of Code). It affects Spring Cloud Gateway Server Webflux versions 3.1.x through 4.3.x when the Spring Boot actuator dependency is present and the gateway actuator web endpoint is enabled and exposed to attackers without authentication. The vulnerability arises because the actuator endpoints allow unauthenticated users to inject malicious Expression Language (EL) statements, enabling them to modify Spring Environment properties dynamically. This can lead to remote code execution, configuration manipulation, and full system compromise. The vulnerability does not affect Spring Cloud Gateway Server WebMVC. The CVSS v3.1 base score is 10.0, reflecting its critical severity with network attack vector, no required privileges or user interaction, and complete impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the ease of exploitation and potential impact make this a highly critical threat. The vulnerability was reserved in April 2025 and published in September 2025. The lack of available patches at the time of reporting increases the urgency for mitigations such as disabling or securing actuator endpoints.
Potential Impact
The impact of CVE-2025-41243 is severe and far-reaching. Exploitation allows attackers to remotely execute arbitrary code or commands by injecting malicious expressions into the Spring Environment, leading to full system compromise. This can result in data breaches, service disruption, unauthorized access to sensitive configuration data, and potential lateral movement within enterprise networks. Organizations relying on Spring Cloud Gateway Server Webflux for API routing and microservice communication are at risk of having their infrastructure compromised, which can affect business continuity and data integrity. The vulnerability's criticality is heightened by the fact that it requires no authentication or user interaction and can be exploited remotely over the network. This makes it a prime target for attackers aiming to compromise cloud-native applications and services. The exposure of actuator endpoints without proper security controls significantly increases the attack surface. Industries such as finance, healthcare, telecommunications, and government agencies that use Spring Cloud Gateway extensively could face significant operational and reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2025-41243, organizations should immediately audit their Spring Cloud Gateway Server Webflux deployments to identify if the actuator endpoints are enabled and exposed. Specifically, verify if management.endpoints.web.exposure.include includes 'gateway' and whether these endpoints are accessible without authentication. If so, restrict access to actuator endpoints using network-level controls such as firewalls or VPNs, and enable authentication and authorization mechanisms for actuator endpoints. Disable the gateway actuator endpoint if it is not required. Monitor logs for suspicious access attempts to actuator endpoints. Apply the latest patches or updates from the Spring project as soon as they become available. Additionally, implement runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with rules to detect and block Expression Language injection attempts. Conduct regular security assessments and penetration testing focused on actuator endpoint exposure. Educate developers and DevOps teams about the risks of exposing actuator endpoints in production environments. Finally, consider adopting a zero-trust approach to internal service communications to limit the impact of any potential compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- vmware
- Date Reserved
- 2025-04-16T09:30:17.799Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c97badd327290d6e7319cd
Added to database: 9/16/2025, 3:01:01 PM
Last enriched: 2/27/2026, 2:01:35 AM
Last updated: 3/25/2026, 9:16:16 PM
Views: 218
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.