๐Ÿ” CVE Alert

CVE-2025-41243

CRITICAL 10.0

Spring Expression Language property modification using Spring Cloud Gateway Server WebFlux

CVSS Score
10.0
EPSS Score
0.0%
EPSS Percentile
0th

Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.

CWE CWE-917 CWE-94
Vendor spring
Product cloud gateway
Ecosystems
Industries
TechnologyEnterprise
Published Sep 16, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for spring cloud gateway

Be the first to know when new critical vulnerabilities affecting spring cloud gateway are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Spring / Cloud Gateway
4.3.x < 4.3.1 4.2.x < 4.2.5 4.1.x, 4.0.x < 4.1.11 3.1.x < 3.1.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
spring.io: https://spring.io/security/cve-2025-41243