Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22737: Vulnerability in Spring Spring Framework

0
Medium
VulnerabilityCVE-2026-22737cvecve-2026-22737
Published: Thu Mar 19 2026 (03/19/2026, 23:53:59 UTC)
Source: CVE Database V5
Vendor/Project: Spring
Product: Spring Framework

Description

Use of Java scripting engine enabled (e.g. JRuby, Jython) template views in Spring MVC and Spring WebFlux applications can result in disclosure of content from files outside the configured locations for script template views. This issue affects Spring Framework: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.

AI-Powered Analysis

AILast updated: 03/20/2026, 00:24:07 UTC

Technical Analysis

CVE-2026-22737 is a vulnerability in the Spring Framework that affects multiple major versions (5.3.x, 6.1.x, 6.2.x, and 7.0.x). The root cause is the use of Java scripting engines (e.g., JRuby, Jython) enabled for template views within Spring MVC and Spring WebFlux applications. When these scripting engines are enabled, an attacker can exploit the vulnerability to access and disclose content from files located outside the configured script template view directories. This occurs because the framework fails to properly restrict file access boundaries when rendering templates using these scripting engines. The vulnerability has a CVSS 3.1 base score of 5.9, indicating medium severity, with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning it is remotely exploitable over the network but requires high attack complexity, no privileges, and no user interaction. The impact is primarily on confidentiality, allowing unauthorized disclosure of potentially sensitive files. No integrity or availability impacts are noted. No public exploits have been reported yet, but the vulnerability is significant for applications that rely on these scripting engines for dynamic template rendering. The affected versions span several major releases, indicating a long-standing issue that requires attention. The lack of patch links suggests that users should monitor official Spring Framework advisories for updates or apply mitigations such as disabling scripting engines in template views if not required.

Potential Impact

The vulnerability can lead to unauthorized disclosure of sensitive information stored in files outside the intended template directories, potentially exposing configuration files, credentials, or other confidential data. This can compromise the confidentiality of enterprise applications using the affected Spring Framework versions with enabled scripting engines. Since the vulnerability does not affect integrity or availability, the primary risk is data leakage. The attack complexity is high, which may limit exploitation to skilled attackers, but no authentication or user interaction is required, increasing exposure for internet-facing applications. Organizations with critical applications built on Spring MVC or WebFlux that utilize JRuby, Jython, or similar scripting engines for template rendering are at particular risk. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate future risk. The widespread use of Spring Framework in enterprise Java applications globally means the potential impact is broad, especially in sectors handling sensitive data such as finance, healthcare, and government.

Mitigation Recommendations

1. Immediately review and disable Java scripting engines (e.g., JRuby, Jython) for template views in Spring MVC and Spring WebFlux applications unless explicitly required. 2. Monitor official Spring Framework security advisories for patches addressing CVE-2026-22737 and apply updates promptly once available. 3. Implement strict access controls and file system permissions to limit the exposure of sensitive files to the application runtime environment. 4. Conduct code audits to identify and refactor any usage of scripting engines in template rendering that could lead to this vulnerability. 5. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to detect and block suspicious template rendering requests that attempt to access unauthorized files. 6. Use application-level logging and monitoring to detect anomalous access patterns or errors related to template rendering. 7. Educate development teams about the risks of enabling scripting engines in template views and encourage secure coding practices. 8. Consider architectural changes to avoid reliance on dynamic scripting engines for template rendering where feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:49.674Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc9033e32a4fbe5f0c418f

Added to database: 3/20/2026, 12:09:23 AM

Last enriched: 3/20/2026, 12:24:07 AM

Last updated: 3/20/2026, 2:31:53 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses