{"api_version":"1","generated_at":"2026-04-24T15:24:48+00:00","cve":"CVE-2026-22733","urls":{"html":"https://cve.report/CVE-2026-22733","api":"https://cve.report/api/cve/CVE-2026-22733.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-22733","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-22733"},"summary":{"title":"Authentication Bypass under Actuator CloudFoundry endpoints","description":"Spring Boot applications with Actuator can be vulnerable to an \"Authentication Bypass\" vulnerability when an application endpoint that requires authentication is declared under the path used by the CloudFoundry Actuator endpoints. This issue affects Spring Security: from 4.0.0 through 4.0.3, from 3.5.0 through 3.5.11, from 3.4.0 through 3.4.14, from 3.3.0 through 3.3.17, from 2.7.0 through 2.7.31.","state":"PUBLISHED","assigner":"vmware","published_at":"2026-03-20 00:16:15","updated_at":"2026-04-23 14:24:37"},"problem_types":["CWE-288","CWE-288 CWE-288 Authentication bypass using an alternate path or channel"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"security@vmware.com","type":"Secondary","score":"8.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"8.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://spring.io/security/cve-2026-22733","name":"https://spring.io/security/cve-2026-22733","refsource":"security@vmware.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-22733","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-22733","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Spring","product":"Spring Security","version":"affected 4.0.0 4.0.3 custom","platforms":[]},{"source":"CNA","vendor":"Spring","product":"Spring Security","version":"affected 3.5.0 3.5.11 custom","platforms":[]},{"source":"CNA","vendor":"Spring","product":"Spring Security","version":"affected 3.4.0 3.4.14 custom","platforms":[]},{"source":"CNA","vendor":"Spring","product":"Spring Security","version":"affected 3.3.0 3.3.17 custom","platforms":[]},{"source":"CNA","vendor":"Spring","product":"Spring Security","version":"affected 2.7.0 2.7.31 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"22733","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vmware","cpe5":"spring_boot","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-22733","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-20T14:45:09.953150Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-20T14:45:18.731Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Spring Security","vendor":"Spring","versions":[{"lessThanOrEqual":"4.0.3","status":"affected","version":"4.0.0","versionType":"custom"},{"lessThanOrEqual":"3.5.11","status":"affected","version":"3.5.0","versionType":"custom"},{"lessThanOrEqual":"3.4.14","status":"affected","version":"3.4.0","versionType":"custom"},{"lessThanOrEqual":"3.3.17","status":"affected","version":"3.3.0","versionType":"custom"},{"lessThanOrEqual":"2.7.31","status":"affected","version":"2.7.0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Spring Boot applications with Actuator can be vulnerable to an \"Authentication Bypass\" vulnerability when an application endpoint that requires authentication is declared under the path used by the CloudFoundry Actuator endpoints.&nbsp;<span>This issue affects Spring Security: from 4.0.0 through 4.0.3, from 3.5.0 through 3.5.11, from 3.4.0 through 3.4.14, from 3.3.0 through 3.3.17, from 2.7.0 through 2.7.31.</span>"}],"value":"Spring Boot applications with Actuator can be vulnerable to an \"Authentication Bypass\" vulnerability when an application endpoint that requires authentication is declared under the path used by the CloudFoundry Actuator endpoints. This issue affects Spring Security: from 4.0.0 through 4.0.3, from 3.5.0 through 3.5.11, from 3.4.0 through 3.4.14, from 3.3.0 through 3.3.17, from 2.7.0 through 2.7.31."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-288","description":"CWE-288 Authentication bypass using an alternate path or channel","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-19T23:29:10.098Z","orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware"},"references":[{"url":"https://spring.io/security/cve-2026-22733"}],"source":{"discovery":"UNKNOWN"},"title":"Authentication Bypass under Actuator CloudFoundry endpoints","x_generator":{"engine":"Vulnogram 1.0.1"}}},"cveMetadata":{"assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","assignerShortName":"vmware","cveId":"CVE-2026-22733","datePublished":"2026-03-19T23:29:10.098Z","dateReserved":"2026-01-09T06:54:41.498Z","dateUpdated":"2026-03-20T14:45:18.731Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-20 00:16:15","lastModifiedDate":"2026-04-23 14:24:37","problem_types":["CWE-288","CWE-288 CWE-288 Authentication bypass using an alternate path or channel"],"metrics":{"cvssMetricV31":[{"source":"security@vmware.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.32","matchCriteriaId":"4513BC8A-943B-4B55-A516-BCBD1B4A218B"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"3.3.0","versionEndExcluding":"3.3.18","matchCriteriaId":"3124B8A3-D4CF-4EB3-8A46-E55C4EBA1648"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4.0","versionEndExcluding":"3.4.15","matchCriteriaId":"0ACB2610-CD68-4D6A-9C4C-0FA18E55E041"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.0","versionEndExcluding":"3.5.12","matchCriteriaId":"2444685F-F529-45D4-91D6-4EDC9128024C"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.0.4","matchCriteriaId":"EF787BE2-58A8-442C-8165-9652D62C0829"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"22733","Ordinal":"1","Title":"Authentication Bypass under Actuator CloudFoundry endpoints","CVE":"CVE-2026-22733","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"22733","Ordinal":"1","NoteData":"Spring Boot applications with Actuator can be vulnerable to an \"Authentication Bypass\" vulnerability when an application endpoint that requires authentication is declared under the path used by the CloudFoundry Actuator endpoints. This issue affects Spring Security: from 4.0.0 through 4.0.3, from 3.5.0 through 3.5.11, from 3.4.0 through 3.4.14, from 3.3.0 through 3.3.17, from 2.7.0 through 2.7.31.","Type":"Description","Title":"Authentication Bypass under Actuator CloudFoundry endpoints"}]}}}