📂 Vulnerable Library - spring-boot-2.7.5.jar
Spring Boot
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.7.5/spring-boot-2.7.5.jar
Findings
| Finding |
Severity |
🎯 CVSS |
Exploit Maturity |
EPSS |
Library |
Type |
Fixed in |
Remediation Available |
Reachability |
| CVE-780011-81885 |
🟣 Critical |
9.8 |
N/A |
N/A |
spring-expression-5.3.23.jar |
Transitive |
N/A |
❌ |
|
| CVE-2018-1196 |
🔴 High |
8.2 |
Not Defined |
< 1% |
spring-boot-2.7.5.jar |
Direct |
1.5.10.RELEASE |
✅ |
Reachable |
| CVE-2018-1271 |
🔴 High |
8.2 |
Not Defined |
91.2% |
spring-core-5.3.23.jar |
Transitive |
N/A |
❌ |
Reachable |
| CVE-2018-1257 |
🔴 High |
7.1 |
Not Defined |
1.8% |
spring-core-5.3.23.jar |
Transitive |
N/A |
❌ |
Reachable |
| CVE-2023-20861 |
🔴 High |
7.1 |
Not Defined |
< 1% |
spring-expression-5.3.23.jar |
Transitive |
N/A |
❌ |
Reachable |
| CVE-2023-20863 |
🔴 High |
7.1 |
Not Defined |
< 1% |
spring-expression-5.3.23.jar |
Transitive |
N/A |
❌ |
Reachable |
| CVE-2025-22235 |
🟠 Medium |
5.5 |
Functional |
< 1% |
spring-boot-2.7.5.jar |
Direct |
org.springframework.boot:spring-boot-actuator-autoconfigure:3.4.5,org.springframework.boot:spring-boot:3.3.11,org.springframework.boot:spring-boot:3.4.5,org.springframework.boot:spring-boot-actuator-autoconfigure:3.3.11,https://github.com/spring-projects/spring-boot.git - v3.3.11,https://github.com/spring-projects/spring-boot.git - v3.4.5 |
✅ |
|
| CVE-2024-38820 |
🟡 Low |
2.3 |
Not Defined |
< 1% |
spring-core-5.3.23.jar |
Transitive |
N/A |
❌ |
|
Details
🟣CVE-780011-81885
Vulnerable Library - spring-expression-5.3.23.jar
Spring Expression Language (SpEL)
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.3.23/spring-expression-5.3.23.jar
Dependency Hierarchy:
- spring-boot-2.7.5.jar (Root Library)
- spring-context-5.3.23.jar
- ❌ spring-expression-5.3.23.jar (Vulnerable Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-780011-81885
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2018-1196
Vulnerable Library - spring-boot-2.7.5.jar
Spring Boot
Library home page: https://spring.io/projects/spring-boot
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.7.5/spring-boot-2.7.5.jar
Dependency Hierarchy:
- ❌ spring-boot-2.7.5.jar (Vulnerable Library)
Reachability Analysis
This vulnerability is potentially reachable:
- org.telegram.telegrambots.starter.TelegramBotStarterConfiguration (Application)
- org.springframework.context.annotation.Bean (Extension)
- org.springframework.beans.factory.annotation.Autowire (Extension)
- org.springframework.beans.factory.config.AutowireCapableBeanFactory (Extension)
- org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory$AutowireByTypeDependencyDescriptor (Extension)
- org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory (Extension)
- org.springframework.beans.factory.annotation.QualifierAnnotationAutowireCandidateResolver (Extension)
- org.springframework.test.web.servlet.setup.StubWebApplicationContext$StubBeanFactory (Extension)
- org.springframework.test.context.testng.AbstractTransactionalTestNGSpringContextTests (Extension)
- org.springframework.boot.web.servlet.context.ServletWebServerApplicationContext (Extension)
-> ❌ org.springframework.boot.availability.AvailabilityChangeEvent (Vulnerable Component)
Vulnerability Details
Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.
Publish Date: Mar 19, 2018 06:00 PM
URL: CVE-2018-1196
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.2
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1196
Release Date: Mar 19, 2018 06:00 PM
Fix Resolution : 1.5.10.RELEASE
🔴CVE-2018-1271
Vulnerable Library - spring-core-5.3.23.jar
Spring Core
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/5.3.23/spring-core-5.3.23.jar
Dependency Hierarchy:
- spring-boot-2.7.5.jar (Root Library)
- ❌ spring-core-5.3.23.jar (Vulnerable Library)
Reachability Analysis
This vulnerability is potentially reachable:
- org.telegram.telegrambots.starter.TelegramBotStarterConfiguration (Application)
- org.springframework.boot.autoconfigure.condition.ConditionalOnMissingBean (Extension)
- org.springframework.context.annotation.Conditional (Extension)
- org.springframework.context.annotation.Condition (Extension)
- org.springframework.context.annotation.ConditionContext (Extension)
- org.springframework.beans.factory.support.BeanDefinitionRegistry (Extension)
- org.springframework.beans.factory.config.BeanDefinition (Extension)
- org.springframework.core.ResolvableType (Extension)
- org.springframework.util.ConcurrentReferenceHashMap (Extension)
-> ❌ org.springframework.util.ConcurrentReferenceHashMap$Task (Vulnerable Component)
Vulnerability Details
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
Publish Date: Apr 06, 2018 01:00 PM
URL: CVE-2018-1271
Threat Assessment
Exploit Maturity:Not Defined
EPSS:91.2%
Score: 8.2
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1271
Release Date: Apr 06, 2018 01:00 PM
Fix Resolution : org.springframework:spring-webflux:5.0.5.RELEASE,org.springframework:spring-webmvc:4.3.15.RELEASE,5.0.5.RELEASE
🔴CVE-2018-1257
Vulnerable Library - spring-core-5.3.23.jar
Spring Core
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/5.3.23/spring-core-5.3.23.jar
Dependency Hierarchy:
- spring-boot-2.7.5.jar (Root Library)
- ❌ spring-core-5.3.23.jar (Vulnerable Library)
Reachability Analysis
This vulnerability is potentially reachable:
- org.telegram.telegrambots.starter.TelegramBotStarterConfiguration (Application)
- org.springframework.boot.autoconfigure.condition.ConditionalOnProperty (Extension)
- org.springframework.boot.autoconfigure.condition.OnPropertyCondition (Extension)
- org.springframework.boot.autoconfigure.condition.SpringBootCondition (Extension)
- org.springframework.beans.factory.config.ConfigurableListableBeanFactory (Extension)
- org.springframework.beans.factory.support.DefaultListableBeanFactory$DependencyObjectProvider (Extension)
- org.springframework.beans.factory.xml.XmlBeanFactory (Extension)
- org.springframework.beans.factory.xml.XmlBeanDefinitionReader (Extension)
- org.springframework.beans.factory.support.AbstractBeanDefinitionReader (Extension)
- org.springframework.core.io.support.PathMatchingResourcePatternResolver (Extension)
- org.springframework.util.AntPathMatcher (Extension)
-> ❌ org.springframework.util.AntPathMatcher$PathSeparatorPatternCache (Vulnerable Component)
Vulnerability Details
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
Publish Date: May 11, 2018 08:00 PM
URL: CVE-2018-1257
Threat Assessment
Exploit Maturity:Not Defined
EPSS:1.8%
Score: 7.1
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-1257
Release Date: May 11, 2018 08:00 PM
Fix Resolution : 5.0.6,4.3.17
🔴CVE-2023-20861
Vulnerable Library - spring-expression-5.3.23.jar
Spring Expression Language (SpEL)
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.3.23/spring-expression-5.3.23.jar
Dependency Hierarchy:
- spring-boot-2.7.5.jar (Root Library)
- spring-context-5.3.23.jar
- ❌ spring-expression-5.3.23.jar (Vulnerable Library)
Reachability Analysis
This vulnerability is potentially reachable:
- org.telegram.telegrambots.starter.TelegramBotStarterConfiguration (Application)
- org.springframework.context.annotation.Bean (Extension)
- org.springframework.beans.factory.annotation.Autowire (Extension)
- org.springframework.beans.factory.config.AutowireCapableBeanFactory (Extension)
- org.springframework.beans.factory.support.DefaultListableBeanFactory$BeanObjectProvider (Extension)
- org.springframework.beans.factory.support.DefaultListableBeanFactory (Extension)
- org.springframework.beans.factory.annotation.QualifierAnnotationAutowireCandidateResolver (Extension)
- org.springframework.context.annotation.ConfigurationClassBeanDefinitionReader$ConfigurationClassBeanDefinition (Extension)
- org.springframework.context.annotation.ConfigurationClassBeanDefinitionReader (Extension)
- org.springframework.context.annotation.AnnotationConfigUtils (Extension)
- org.springframework.context.support.GenericGroovyApplicationContext (Extension)
- org.springframework.context.support.AbstractApplicationContext (Extension)
- org.springframework.context.expression.StandardBeanExpressionResolver (Extension)
- org.springframework.expression.spel.standard.SpelExpressionParser (Extension)
- org.springframework.expression.spel.standard.InternalSpelExpressionParser (Extension)
-> ❌ org.springframework.expression.spel.ast.OperatorMatches (Vulnerable Component)
Vulnerability Details
In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Publish Date: Mar 23, 2023 12:00 AM
URL: CVE-2023-20861
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.1
Suggested Fix
Type: Upgrade version
Origin: GHSA-564r-hj7v-mcr5
Release Date: Mar 23, 2023 12:00 AM
Fix Resolution : org.springframework:spring-expression:5.2.23.RELEASE,org.springframework:spring-expression:6.0.7,org.springframework:spring-expression:5.3.26
🔴CVE-2023-20863
Vulnerable Library - spring-expression-5.3.23.jar
Spring Expression Language (SpEL)
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.3.23/spring-expression-5.3.23.jar
Dependency Hierarchy:
- spring-boot-2.7.5.jar (Root Library)
- spring-context-5.3.23.jar
- ❌ spring-expression-5.3.23.jar (Vulnerable Library)
Reachability Analysis
This vulnerability is potentially reachable:
- org.telegram.telegrambots.starter.TelegramBotStarterConfiguration (Application)
- org.springframework.context.annotation.Bean (Extension)
- org.springframework.beans.factory.annotation.Autowire (Extension)
- org.springframework.beans.factory.config.AutowireCapableBeanFactory (Extension)
- org.springframework.beans.factory.support.BeanDefinitionOverrideException (Extension)
- org.springframework.beans.factory.config.BeanDefinition (Extension)
- org.springframework.beans.factory.xml.XmlBeanFactory (Extension)
- org.springframework.beans.factory.annotation.QualifierAnnotationAutowireCandidateResolver (Extension)
- org.springframework.context.support.GenericApplicationContext$ClassDerivedBeanDefinition (Extension)
- org.springframework.context.support.GenericApplicationContext (Extension)
- org.springframework.context.event.EventListenerMethodProcessor (Extension)
- org.springframework.context.event.EventExpressionEvaluator (Extension)
- org.springframework.expression.spel.standard.SpelExpressionParser (Extension)
- org.springframework.expression.spel.SpelParseException (Extension)
-> ❌ org.springframework.expression.spel.SpelMessage (Vulnerable Component)
Vulnerability Details
In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Publish Date: Apr 13, 2023 12:00 AM
URL: CVE-2023-20863
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.1
Suggested Fix
Type: Upgrade version
Origin: GHSA-wxqc-pxw9-g2p8
Release Date: Apr 13, 2023 12:00 AM
Fix Resolution : org.springframework:spring-expression:5.3.27,org.springframework:spring-expression:5.2.24.RELEASE,org.springframework:spring-expression:6.0.8
🟠CVE-2025-22235
Vulnerable Library - spring-boot-2.7.5.jar
Spring Boot
Library home page: https://spring.io/projects/spring-boot
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.7.5/spring-boot-2.7.5.jar
Dependency Hierarchy:
- ❌ spring-boot-2.7.5.jar (Vulnerable Library)
Vulnerability Details
In Spring Boot, the EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed.
Publish Date: Apr 28, 2025 07:10 AM
URL: CVE-2025-22235
Threat Assessment
Exploit Maturity:Functional
EPSS:< 1%
Score: 5.5
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2025-22235
Release Date: Apr 24, 2025 09:00 PM
Fix Resolution : org.springframework.boot:spring-boot-actuator-autoconfigure:3.4.5,org.springframework.boot:spring-boot:3.3.11,org.springframework.boot:spring-boot:3.4.5,org.springframework.boot:spring-boot-actuator-autoconfigure:3.3.11,https://github.com/spring-projects/spring-boot.git - v3.3.11,https://github.com/spring-projects/spring-boot.git - v3.4.5
🟡CVE-2024-38820
Vulnerable Library - spring-core-5.3.23.jar
Spring Core
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/5.3.23/spring-core-5.3.23.jar
Dependency Hierarchy:
- spring-boot-2.7.5.jar (Root Library)
- ❌ spring-core-5.3.23.jar (Vulnerable Library)
Vulnerability Details
The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.
Publish Date: Oct 18, 2024 05:39 AM
URL: CVE-2024-38820
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 2.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-4gc7-5j7h-4qph
Release Date: Oct 18, 2024 05:39 AM
Fix Resolution : org.springframework:spring-context:6.1.14
📂 Vulnerable Library - spring-boot-2.7.5.jar
Spring Boot
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.7.5/spring-boot-2.7.5.jar
Findings
Details
🟣CVE-780011-81885
Vulnerable Library - spring-expression-5.3.23.jar
Spring Expression Language (SpEL)
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.3.23/spring-expression-5.3.23.jar
Dependency Hierarchy:
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-780011-81885
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2018-1196
Vulnerable Library - spring-boot-2.7.5.jar
Spring Boot
Library home page: https://spring.io/projects/spring-boot
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.7.5/spring-boot-2.7.5.jar
Dependency Hierarchy:
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.
Publish Date: Mar 19, 2018 06:00 PM
URL: CVE-2018-1196
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.2
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1196
Release Date: Mar 19, 2018 06:00 PM
Fix Resolution : 1.5.10.RELEASE
🔴CVE-2018-1271
Vulnerable Library - spring-core-5.3.23.jar
Spring Core
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/5.3.23/spring-core-5.3.23.jar
Dependency Hierarchy:
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
Publish Date: Apr 06, 2018 01:00 PM
URL: CVE-2018-1271
Threat Assessment
Exploit Maturity:Not Defined
EPSS:91.2%
Score: 8.2
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1271
Release Date: Apr 06, 2018 01:00 PM
Fix Resolution : org.springframework:spring-webflux:5.0.5.RELEASE,org.springframework:spring-webmvc:4.3.15.RELEASE,5.0.5.RELEASE
🔴CVE-2018-1257
Vulnerable Library - spring-core-5.3.23.jar
Spring Core
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/5.3.23/spring-core-5.3.23.jar
Dependency Hierarchy:
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
Publish Date: May 11, 2018 08:00 PM
URL: CVE-2018-1257
Threat Assessment
Exploit Maturity:Not Defined
EPSS:1.8%
Score: 7.1
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-1257
Release Date: May 11, 2018 08:00 PM
Fix Resolution : 5.0.6,4.3.17
🔴CVE-2023-20861
Vulnerable Library - spring-expression-5.3.23.jar
Spring Expression Language (SpEL)
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.3.23/spring-expression-5.3.23.jar
Dependency Hierarchy:
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Publish Date: Mar 23, 2023 12:00 AM
URL: CVE-2023-20861
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.1
Suggested Fix
Type: Upgrade version
Origin: GHSA-564r-hj7v-mcr5
Release Date: Mar 23, 2023 12:00 AM
Fix Resolution : org.springframework:spring-expression:5.2.23.RELEASE,org.springframework:spring-expression:6.0.7,org.springframework:spring-expression:5.3.26
🔴CVE-2023-20863
Vulnerable Library - spring-expression-5.3.23.jar
Spring Expression Language (SpEL)
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.3.23/spring-expression-5.3.23.jar
Dependency Hierarchy:
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Publish Date: Apr 13, 2023 12:00 AM
URL: CVE-2023-20863
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.1
Suggested Fix
Type: Upgrade version
Origin: GHSA-wxqc-pxw9-g2p8
Release Date: Apr 13, 2023 12:00 AM
Fix Resolution : org.springframework:spring-expression:5.3.27,org.springframework:spring-expression:5.2.24.RELEASE,org.springframework:spring-expression:6.0.8
🟠CVE-2025-22235
Vulnerable Library - spring-boot-2.7.5.jar
Spring Boot
Library home page: https://spring.io/projects/spring-boot
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.7.5/spring-boot-2.7.5.jar
Dependency Hierarchy:
Vulnerability Details
In Spring Boot, the EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed.
Publish Date: Apr 28, 2025 07:10 AM
URL: CVE-2025-22235
Threat Assessment
Exploit Maturity:Functional
EPSS:< 1%
Score: 5.5
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2025-22235
Release Date: Apr 24, 2025 09:00 PM
Fix Resolution : org.springframework.boot:spring-boot-actuator-autoconfigure:3.4.5,org.springframework.boot:spring-boot:3.3.11,org.springframework.boot:spring-boot:3.4.5,org.springframework.boot:spring-boot-actuator-autoconfigure:3.3.11,https://github.com/spring-projects/spring-boot.git - v3.3.11,https://github.com/spring-projects/spring-boot.git - v3.4.5
🟡CVE-2024-38820
Vulnerable Library - spring-core-5.3.23.jar
Spring Core
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /telegrambots-spring-boot-starter/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/5.3.23/spring-core-5.3.23.jar
Dependency Hierarchy:
Vulnerability Details
The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.
Publish Date: Oct 18, 2024 05:39 AM
URL: CVE-2024-38820
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 2.3
Suggested Fix
Type: Upgrade version
Origin: GHSA-4gc7-5j7h-4qph
Release Date: Oct 18, 2024 05:39 AM
Fix Resolution : org.springframework:spring-context:6.1.14