Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41254: CWE-352: Cross-Site Request Forgery (CSRF) in VMware Spring Framework

0
Medium
VulnerabilityCVE-2025-41254cvecve-2025-41254cwe-352
Published: Thu Oct 16 2025 (10/16/2025, 14:48:37 UTC)
Source: CVE Database V5
Vendor/Project: VMware
Product: Spring Framework

Description

STOMP over WebSocket applications may be vulnerable to a security bypass that allows an attacker to send unauthorized messages. Affected Spring Products and VersionsSpring Framework: * 6.2.0 - 6.2.11 * 6.1.0 - 6.1.23 * 6.0.x - 6.0.29 * 5.3.0 - 5.3.45 * Older, unsupported versions are also affected. MitigationUsers of affected versions should upgrade to the corresponding fixed version. Affected version(s)Fix versionAvailability6.2.x6.2.12OSS6.1.x6.1.24 Commercial https://enterprise.spring.io/ 6.0.xN/A Out of support https://spring.io/projects/spring-framework#support 5.3.x5.3.46 Commercial https://enterprise.spring.io/ No further mitigation steps are necessary. CreditThis vulnerability was discovered and responsibly reported by Jannis Kaiser.

AI-Powered Analysis

AILast updated: 10/16/2025, 15:14:52 UTC

Technical Analysis

CVE-2025-41254 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the VMware Spring Framework, specifically impacting applications that use STOMP over WebSocket messaging. The vulnerability arises because the affected Spring Framework versions (5.3.0 to 5.3.45, 6.0.x up to 6.0.29, 6.1.0 to 6.1.23, and 6.2.0 to 6.2.11) do not adequately protect against unauthorized message sending via CSRF attacks. STOMP (Simple Text Oriented Messaging Protocol) over WebSocket is commonly used for real-time messaging in web applications. An attacker exploiting this vulnerability can craft malicious requests that, when executed by an authenticated user’s browser, send unauthorized STOMP messages to the server, potentially manipulating application state or triggering unintended actions. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (e.g., tricking a user into visiting a malicious page). The impact is limited to integrity, with no direct confidentiality or availability consequences. VMware has released fixed versions: 6.2.12 for 6.2.x, 6.1.24 for 6.1.x, and 5.3.46 for 5.3.x; however, 6.0.x is out of support and has no fix. Users of affected versions are strongly advised to upgrade to these patched releases. The vulnerability was responsibly disclosed by Jannis Kaiser. No known exploits are currently in the wild, but the presence of a fix indicates the risk is recognized and should be addressed promptly.

Potential Impact

For European organizations, the impact of CVE-2025-41254 primarily concerns the integrity of web applications using the Spring Framework with STOMP over WebSocket. Attackers could send unauthorized messages that may alter application behavior, potentially leading to unauthorized actions such as data manipulation, transaction tampering, or triggering unintended workflows. While confidentiality and availability are not directly impacted, the integrity compromise could result in business process disruptions, reputational damage, or regulatory compliance issues, especially in sectors like finance, healthcare, and government where data accuracy and process integrity are critical. Organizations relying on vulnerable Spring Framework versions in customer-facing or internal real-time messaging applications are at risk. The requirement for user interaction means phishing or social engineering could be used to facilitate attacks. The lack of authentication requirement lowers the barrier for attackers to exploit this vulnerability once a user is tricked into interaction. Given the widespread use of Spring Framework in Europe’s software ecosystem, the potential for impact is significant if unpatched.

Mitigation Recommendations

1. Upgrade all affected Spring Framework versions to the fixed releases: 6.2.12 for 6.2.x, 6.1.24 for 6.1.x, and 5.3.46 for 5.3.x. For 6.0.x versions, consider migrating to supported versions as no patch is available. 2. Review and harden WebSocket and STOMP configurations to enforce strict origin checks and CSRF protections where applicable. 3. Implement Content Security Policy (CSP) headers to reduce the risk of malicious script execution that could facilitate CSRF attacks. 4. Educate users about phishing and social engineering risks to reduce successful user interaction exploitation. 5. Employ Web Application Firewalls (WAFs) with rules designed to detect and block suspicious WebSocket traffic patterns. 6. Conduct thorough security testing of applications using STOMP over WebSocket to identify and remediate any additional weaknesses. 7. Monitor application logs for unusual STOMP message activity that could indicate exploitation attempts. 8. For organizations unable to immediately upgrade, consider temporary mitigations such as disabling STOMP over WebSocket if not essential or restricting access to trusted networks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
vmware
Date Reserved
2025-04-16T09:30:25.626Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f108349f8a5dbaeadb947b

Added to database: 10/16/2025, 2:59:00 PM

Last enriched: 10/16/2025, 3:14:52 PM

Last updated: 10/16/2025, 4:52:52 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats