🔐 CVE Alert

CVE-2026-22750

HIGH 7.5

SSL bundle configuration silently bypassed in Spring Cloud Gateway

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

When configuring SSL bundles in Spring Cloud Gateway by using the configuration property spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead. Note: The 4.2.x branch is no longer under open source support. If you are using Spring Cloud Gateway 4.2.0 and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway 4.2.x release newer than 4.2.0  available on Maven Centeral https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/ . Ideally if you are not an enterprise customer, you should be upgrading to 5.0.2 or 5.1.1 which are the current supported open source releases.

Vendor vmware
Product spring cloud gateway
Ecosystems
Industries
TechnologyEnterprise
Published Apr 10, 2026
Last Updated Apr 10, 2026
Stay Ahead of the Next One

Get instant alerts for vmware spring cloud gateway

Be the first to know when new high vulnerabilities affecting vmware spring cloud gateway are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

VMware / Spring Cloud Gateway
4.2.0 < 4.2.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
spring.io: https://spring.io/security/cve-2026-22750