Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22733: CWE-288 Authentication bypass using an alternate path or channel in Spring Spring Security

0
High
VulnerabilityCVE-2026-22733cvecve-2026-22733cwe-288
Published: Thu Mar 19 2026 (03/19/2026, 23:29:10 UTC)
Source: CVE Database V5
Vendor/Project: Spring
Product: Spring Security

Description

CVE-2026-22733 is a high-severity authentication bypass vulnerability affecting multiple versions of Spring Security used in Spring Boot applications with Actuator endpoints. The flaw arises when an application endpoint requiring authentication is declared under the same path as CloudFoundry Actuator endpoints, allowing attackers to bypass authentication controls. This vulnerability impacts Spring Security versions from 2. 7. 0 through 4. 0. 3. Exploitation requires no privileges or user interaction and can lead to full confidentiality compromise with limited integrity impact, but no availability impact. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and broad usage of Spring Security make it a significant risk. Organizations using affected Spring versions should prioritize patching or applying mitigations to prevent unauthorized access to sensitive application endpoints.

AI-Powered Analysis

AILast updated: 03/19/2026, 23:53:38 UTC

Technical Analysis

CVE-2026-22733 is an authentication bypass vulnerability classified under CWE-288 that affects Spring Security versions 2.7.0 through 4.0.3. The vulnerability occurs specifically in Spring Boot applications that use Actuator endpoints, particularly when an application endpoint requiring authentication is declared under the same path as CloudFoundry Actuator endpoints. This path overlap allows attackers to circumvent authentication mechanisms and access protected resources without credentials. The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it highly accessible to attackers. The flaw impacts confidentiality severely, as unauthorized users can access sensitive data, while integrity is only slightly affected and availability remains unaffected. The vulnerability has a CVSS v3.1 base score of 8.2, indicating high severity, with an attack vector of network, low attack complexity, no privileges required, and no user interaction needed. Despite no known exploits in the wild to date, the widespread use of Spring Security in enterprise Java applications and the critical nature of Actuator endpoints for application monitoring and management elevate the risk. The vulnerability was publicly disclosed on March 19, 2026, and affects multiple legacy and current Spring Security versions, emphasizing the need for immediate attention from organizations using these versions.

Potential Impact

The primary impact of CVE-2026-22733 is unauthorized access to sensitive application endpoints that are intended to be protected by authentication, leading to a breach of confidentiality. Attackers exploiting this vulnerability can gain access to potentially sensitive operational data, configuration details, or management interfaces exposed via Actuator endpoints. This can facilitate further attacks, including data exfiltration, reconnaissance, or lateral movement within an organization's infrastructure. The integrity impact is limited but could allow attackers to view or partially manipulate some data depending on the endpoint accessed. Availability is not directly impacted by this vulnerability. Organizations relying on affected Spring Security versions face significant risk, especially those exposing Actuator endpoints in production environments without additional network-level protections. The ease of exploitation and lack of required privileges increase the likelihood of exploitation attempts, potentially leading to widespread unauthorized access incidents. This vulnerability could be particularly damaging in industries with sensitive data such as finance, healthcare, and government sectors.

Mitigation Recommendations

To mitigate CVE-2026-22733, organizations should immediately upgrade to patched versions of Spring Security where this vulnerability is resolved. If upgrading is not immediately feasible, organizations should implement strict network-level access controls to restrict access to Actuator endpoints, ensuring they are not exposed to untrusted networks or the public internet. Application developers should avoid declaring application endpoints under the same path as CloudFoundry Actuator endpoints to prevent path-based authentication bypass. Additionally, enabling and enforcing strong authentication and authorization mechanisms at both the application and infrastructure layers can reduce risk. Monitoring and logging access to Actuator endpoints should be enhanced to detect any unauthorized access attempts promptly. Organizations should also review their deployment configurations to ensure that sensitive management endpoints are disabled or secured appropriately in production environments. Finally, conducting a thorough security assessment of Spring Boot applications using affected versions can help identify and remediate any exposure caused by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:41.498Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc8929e32a4fbe5f08fecc

Added to database: 3/19/2026, 11:39:21 PM

Last enriched: 3/19/2026, 11:53:38 PM

Last updated: 3/20/2026, 1:15:52 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses