CVE-2026-40968
Spring gRPC SecurityContext leaks across requests on authorization failure
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th
When an authenticated user is denied access to a gRPC method, their authenticated identity remains bound to the gRPC worker thread and can be inherited by a subsequent unauthenticated request on the same thread. This may allow the subsequent user to gain escalated permissions. Affected versions: Spring gRPC: 1.0.0 - 1.0.2 (fixed in 1.0.3). Older, unsupported versions are also affected.
| CWE | CWE-653 |
| Vendor | spring |
| Product | spring grpc |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Apr 28, 2026 |
| Last Updated | Apr 28, 2026 |
Stay Ahead of the Next One
Get instant alerts for spring spring grpc
Be the first to know when new medium vulnerabilities affecting spring spring grpc are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
Spring / Spring gRPC
1.0.0 < 1.0.3