🔐 CVE Alert

CVE-2026-22746

LOW 3.7

User Attribute Enumeration when Using DaoAuthenticationProvider

CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
0th

Vulnerability in Spring Spring Security. If an application is using the UserDetails#isEnabled, #isAccountNonExpired, or #isAccountNonLocked user attributes, to enable, expire, or lock users, then DaoAuthenticationProvider's timing attack defense can be bypassed for users who are disabled, expired, or locked.This issue affects Spring Security: from 5.7.0 through 5.7.22, from 5.8.0 through 5.8.24, from 6.3.0 through 6.3.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.

Vendor spring
Product spring security
Ecosystems
Industries
TechnologyEnterprise
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for spring spring security

Be the first to know when new low vulnerabilities affecting spring spring security are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

Spring / Spring Security
5.7.0 ≤ 5.7.22 5.8.0 ≤ 5.8.24 6.3.0 ≤ 6.3.15 6.5.0 ≤ 6.5.9 7.0.0 ≤ 7.0.4

References

NVD ↗ CVE.org ↗ EPSS Data ↗
spring.io: https://spring.io/security/cve-2026-22746