CVE-2026-40975
CVSS Score
4.8
EPSS Score
0.0%
EPSS Percentile
0th
Values produced by ${random.value} are not suitable for use as secrets. ${random.uuid} is not affected. ${random.int} and ${random.long} should never be used for secrets as they are numeric values with a predictable range. Affected: Spring Boot 4.0.0โ4.0.5 (fix 4.0.6), 3.5.0โ3.5.13 (fix 3.5.14), 3.4.0โ3.4.15 (fix 3.4.16), 3.3.0โ3.3.18 (fix 3.3.19), 2.7.0โ2.7.32 (fix 2.7.33); random value property source / weak PRNG for secrets. Versions that are no longer supported are also affected per vendor advisory.
| CWE | CWE-330 |
| Vendor | spring |
| Product | spring boot |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Apr 27, 2026 |
Stay Ahead of the Next One
Get instant alerts for spring spring boot
Be the first to know when new medium vulnerabilities affecting spring spring boot are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
Spring / Spring Boot
4.0.0 < 4.0.6 3.5.0 < 3.5.14 3.4.0 < 3.4.16 3.3.0 < 3.3.19 2.7.0 < 2.7.33