Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22732: Vulnerability in Spring Spring Security

0
Critical
VulnerabilityCVE-2026-22732cvecve-2026-22732
Published: Thu Mar 19 2026 (03/19/2026, 22:47:38 UTC)
Source: CVE Database V5
Vendor/Project: Spring
Product: Spring Security

Description

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written.  This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.

AI-Powered Analysis

AILast updated: 03/19/2026, 23:23:50 UTC

Technical Analysis

CVE-2026-22732 is a critical security vulnerability identified in the Spring Security framework, a widely used Java security module for web applications. The issue arises when applications specify HTTP response headers in servlet-based applications; due to the vulnerability, these headers may not be written to the HTTP response as intended. This failure can undermine security controls that rely on HTTP headers, such as Content Security Policy (CSP), Strict-Transport-Security (HSTS), X-Frame-Options, and others that protect against cross-site scripting, clickjacking, and man-in-the-middle attacks. The vulnerability affects multiple versions of Spring Security, specifically from 5.7.0 through 5.7.21, 5.8.0 through 5.8.23, 6.3.0 through 6.3.14, 6.4.0 through 6.4.14, 6.5.0 through 6.5.8, and 7.0.0 through 7.0.3. The CVSS 3.1 base score is 9.1, reflecting the ease of remote exploitation without authentication or user interaction, and the high impact on confidentiality and integrity. Although no exploits have been reported in the wild yet, the vulnerability’s nature makes it a significant risk for web applications relying on Spring Security to enforce HTTP header-based security policies. The root cause likely involves improper handling or conditional logic in the framework’s HTTP response header writing mechanism, which can be bypassed or fail silently, leaving applications exposed. This vulnerability could allow attackers to bypass critical security headers, leading to data leakage, session hijacking, or other attacks that compromise user data and application integrity.

Potential Impact

The impact of CVE-2026-22732 is substantial for organizations worldwide that use Spring Security in their web applications. Since HTTP response headers are fundamental to enforcing security policies such as CSP, HSTS, and X-Frame-Options, their omission can expose applications to a range of attacks including cross-site scripting (XSS), clickjacking, and man-in-the-middle (MITM) attacks. Confidentiality is severely impacted as sensitive data may be exposed or intercepted. Integrity is also at risk because attackers can manipulate responses or bypass security controls. Availability is less directly affected but could be indirectly impacted through exploitation chains. The vulnerability requires no authentication or user interaction, making it easier for attackers to exploit remotely. Given Spring Security’s widespread adoption in enterprise and cloud-native Java applications, the scope of affected systems is broad, encompassing financial services, healthcare, government, e-commerce, and technology sectors globally. Failure to address this vulnerability promptly could lead to data breaches, regulatory penalties, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2026-22732, organizations should prioritize upgrading Spring Security to the latest patched versions beyond 5.7.21, 5.8.23, 6.3.14, 6.4.14, 6.5.8, or 7.0.3 as soon as they become available from the vendor. Until patches are applied, implement the following specific measures: 1) Conduct a thorough audit of HTTP response headers in your applications to identify any missing or improperly applied security headers. 2) Use web application firewalls (WAFs) to enforce critical HTTP headers at the network edge as a compensating control. 3) Implement runtime monitoring and alerting for HTTP responses missing expected security headers. 4) Review and harden servlet container configurations to ensure headers are not stripped or altered. 5) Educate development teams on secure header management and validate header presence in testing and CI/CD pipelines. 6) Consider deploying additional security layers such as Content Delivery Networks (CDNs) that can inject or enforce security headers. These targeted steps go beyond generic patching advice and help reduce exposure during the remediation window.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:41.498Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc8223e32a4fbe5f062176

Added to database: 3/19/2026, 11:09:23 PM

Last enriched: 3/19/2026, 11:23:50 PM

Last updated: 3/20/2026, 2:45:03 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses