CVE-2026-40972
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading changed classes, thereby achieving remote code execution in the remote application. Affected: Spring Boot 4.0.0โ4.0.5 (fix 4.0.6), 3.5.0โ3.5.13 (fix 3.5.14), 3.4.0โ3.4.15 (fix 3.4.16), 3.3.0โ3.3.18 (fix 3.3.19), 2.7.0โ2.7.32 (fix 2.7.33); DevTools remote secret comparison. Versions that are no longer supported are also affected per vendor advisory.
| CWE | CWE-208 |
| Vendor | spring |
| Product | spring boot |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Apr 27, 2026 |
Stay Ahead of the Next One
Get instant alerts for spring spring boot
Be the first to know when new high vulnerabilities affecting spring spring boot are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Spring / Spring Boot
4.0.0 < 4.0.6 3.5.0 < 3.5.14 3.4.0 < 3.4.16 3.3.0 < 3.3.19 2.7.0 < 2.7.33