CVE-2025-41243
Spring Expression Language property modification using Spring Cloud Gateway Server WebFlux
CVSS Score
10.0
EPSS Score
0.0%
EPSS Percentile
0th
Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
| CWE | CWE-917 CWE-94 |
| Vendor | spring |
| Product | cloud gateway |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Sep 16, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for spring cloud gateway
Be the first to know when new critical vulnerabilities affecting spring cloud gateway are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Spring / Cloud Gateway
4.3.x < 4.3.1 4.2.x < 4.2.5 4.1.x, 4.0.x < 4.1.11 3.1.x < 3.1.11