{"api_version":"1","generated_at":"2026-04-19T08:31:51+00:00","cve":"CVE-2026-22750","urls":{"html":"https://cve.report/CVE-2026-22750","api":"https://cve.report/api/cve/CVE-2026-22750.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-22750","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-22750"},"summary":{"title":"SSL bundle configuration silently bypassed in Spring Cloud Gateway","description":"When configuring SSL bundles in Spring Cloud Gateway by using the configuration property spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.\nNote: The 4.2.x branch is no longer under open source support. If you are using Spring Cloud Gateway 4.2.0 and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway 4.2.x release newer than 4.2.0  available on Maven Centeral https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/ . Ideally if you are not an enterprise customer, you should be upgrading to 5.0.2 or 5.1.1 which are the current supported open source releases.","state":"PUBLISHED","assigner":"vmware","published_at":"2026-04-10 08:16:24","updated_at":"2026-04-13 15:02:06"},"problem_types":["CWE-15","CWE-15 CWE-15 External Control of System or Configuration Setting"],"metrics":[{"version":"3.1","source":"security@vmware.com","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://spring.io/security/cve-2026-22750","name":"https://spring.io/security/cve-2026-22750","refsource":"security@vmware.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-22750","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-22750","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"VMware","product":"Spring Cloud Gateway","version":"affected 4.2.0 4.2.1 ENTERPRISE","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"22750","cve":"CVE-2026-22750","epss":"0.000340000","percentile":"0.098680000","score_date":"2026-04-15","updated_at":"2026-04-16 00:13:57"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-22750","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-10T12:59:10.606788Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-15","description":"CWE-15 External Control of System or Configuration Setting","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-10T12:59:14.451Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","packageName":"Spring Cloud Gateway","product":"Spring Cloud Gateway","vendor":"VMware","versions":[{"lessThan":"4.2.1","status":"affected","version":"4.2.0","versionType":"ENTERPRISE"}]}],"datePublic":"2026-04-09T14:15:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"When configuring SSL bundles in Spring Cloud Gateway by using the configuration property&nbsp;<code>spring.ssl.bundle</code>, the configuration was silently ignored and the default SSL configuration was used instead.<br>Note: The&nbsp;<code>4.2.x</code>&nbsp;branch is no longer under open source support. If you are using Spring Cloud Gateway&nbsp;<code>4.2.0</code>&nbsp;and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway&nbsp;<code>4.2.x</code>&nbsp;release newer than&nbsp;<code>4.2.0</code>&nbsp;<a href=\"https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/\">available on Maven Centeral</a>. Ideally if you are not an enterprise customer, you should be upgrading to&nbsp;<code>5.0.2</code>&nbsp;or&nbsp;<code>5.1.1</code>&nbsp;which are the current supported open source releases."}],"value":"When configuring SSL bundles in Spring Cloud Gateway by using the configuration property spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.\nNote: The 4.2.x branch is no longer under open source support. If you are using Spring Cloud Gateway 4.2.0 and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway 4.2.x release newer than 4.2.0  available on Maven Centeral https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/ . Ideally if you are not an enterprise customer, you should be upgrading to 5.0.2 or 5.1.1 which are the current supported open source releases."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"dateUpdated":"2026-04-10T07:32:31.260Z","orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware"},"references":[{"url":"https://spring.io/security/cve-2026-22750"}],"source":{"discovery":"UNKNOWN"},"title":"SSL bundle configuration silently bypassed in Spring Cloud Gateway","x_generator":{"engine":"Vulnogram 1.0.1"}}},"cveMetadata":{"assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","assignerShortName":"vmware","cveId":"CVE-2026-22750","datePublished":"2026-04-10T07:32:31.260Z","dateReserved":"2026-01-09T06:55:03.990Z","dateUpdated":"2026-04-10T12:59:14.451Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-10 08:16:24","lastModifiedDate":"2026-04-13 15:02:06","problem_types":["CWE-15","CWE-15 CWE-15 External Control of System or Configuration Setting"],"metrics":{"cvssMetricV31":[{"source":"security@vmware.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"22750","Ordinal":"1","Title":"SSL bundle configuration silently bypassed in Spring Cloud Gatew","CVE":"CVE-2026-22750","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"22750","Ordinal":"1","NoteData":"When configuring SSL bundles in Spring Cloud Gateway by using the configuration property spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.\nNote: The 4.2.x branch is no longer under open source support. If you are using Spring Cloud Gateway 4.2.0 and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway 4.2.x release newer than 4.2.0  available on Maven Centeral https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/ . Ideally if you are not an enterprise customer, you should be upgrading to 5.0.2 or 5.1.1 which are the current supported open source releases.","Type":"Description","Title":"SSL bundle configuration silently bypassed in Spring Cloud Gatew"}]}}}