{"api_version":"1","generated_at":"2026-05-04T18:42:18+00:00","cve":"CVE-2026-40973","urls":{"html":"https://cve.report/CVE-2026-40973","api":"https://cve.report/api/cve/CVE-2026-40973.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-40973","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-40973"},"summary":{"title":"CVE-2026-40973","description":"A local attacker on the same host as the application may be able to take control of the directory used by `ApplicationTemp`. When `server.servlet.session.persistent` is set to `true` and the attack persists across application restarts, this may allow the attacker to read session information and hijack authenticated users or deploy a gadget chain and execute code as the application's user.\n\nAffected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); predictable temp directory / `ApplicationTemp` ownership verification. Versions that are no longer supported are also affected per vendor advisory.","state":"PUBLISHED","assigner":"vmware","published_at":"2026-04-28 00:16:24","updated_at":"2026-04-30 14:25:36"},"problem_types":["CWE-377","CWE-377 CWE-377: Insecure Temporary File"],"metrics":[{"version":"3.1","source":"security@vmware.com","type":"Secondary","score":"7","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://spring.io/security/cve-2026-40973","name":"https://spring.io/security/cve-2026-40973","refsource":"security@vmware.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-40973","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40973","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Spring","product":"Spring Boot","version":"affected 4.0.0 4.0.6 custom","platforms":[]},{"source":"CNA","vendor":"Spring","product":"Spring Boot","version":"affected 3.5.0 3.5.14 custom","platforms":[]},{"source":"CNA","vendor":"Spring","product":"Spring Boot","version":"affected 3.4.0 3.4.16 custom","platforms":[]},{"source":"CNA","vendor":"Spring","product":"Spring Boot","version":"affected 3.3.0 3.3.19 custom","platforms":[]},{"source":"CNA","vendor":"Spring","product":"Spring Boot","version":"affected 2.7.0 2.7.33 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"40973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vmware","cpe5":"spring_boot","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"40973","cve":"CVE-2026-40973","epss":"0.000140000","percentile":"0.024710000","score_date":"2026-04-28","updated_at":"2026-04-29 00:07:40"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-40973","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-28T00:00:00+00:00","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-29T03:55:43.148Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Spring Boot","vendor":"Spring","versions":[{"lessThan":"4.0.6","status":"affected","version":"4.0.0","versionType":"custom"},{"lessThan":"3.5.14","status":"affected","version":"3.5.0","versionType":"custom"},{"lessThan":"3.4.16","status":"affected","version":"3.4.0","versionType":"custom"},{"lessThan":"3.3.19","status":"affected","version":"3.3.0","versionType":"custom"},{"lessThan":"2.7.33","status":"affected","version":"2.7.0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A local attacker on the same host as the application may be able to take control of the directory used by <code>ApplicationTemp</code>. When <code>server.servlet.session.persistent</code> is set to <code>true</code> and the attack persists across application restarts, this may allow the attacker to read session information and hijack authenticated users or deploy a gadget chain and execute code as the application's user.</p><p>Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); predictable temp directory / <code>ApplicationTemp</code> ownership verification. Versions that are no longer supported are also affected per vendor advisory.</p>"}],"value":"A local attacker on the same host as the application may be able to take control of the directory used by `ApplicationTemp`. When `server.servlet.session.persistent` is set to `true` and the attack persists across application restarts, this may allow the attacker to read session information and hijack authenticated users or deploy a gadget chain and execute code as the application's user.\n\nAffected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); predictable temp directory / `ApplicationTemp` ownership verification. Versions that are no longer supported are also affected per vendor advisory."}],"impacts":[{"descriptions":[{"lang":"en","value":"Per CVSS v3.1: Confidentiality HIGH; Integrity HIGH; Availability HIGH."}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-377","description":"CWE-377: Insecure Temporary File","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-27T23:29:51.946Z","orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware"},"references":[{"url":"https://spring.io/security/cve-2026-40973"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}}},"cveMetadata":{"assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","assignerShortName":"vmware","cveId":"CVE-2026-40973","datePublished":"2026-04-27T23:29:51.946Z","dateReserved":"2026-04-16T02:18:56.133Z","dateUpdated":"2026-04-29T03:55:43.148Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-28 00:16:24","lastModifiedDate":"2026-04-30 14:25:36","problem_types":["CWE-377","CWE-377 CWE-377: Insecure Temporary File"],"metrics":{"cvssMetricV31":[{"source":"security@vmware.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.33","matchCriteriaId":"5B1C9BD7-7555-4B3D-AED9-60C3C13DCF46"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"3.3.0","versionEndExcluding":"3.3.19","matchCriteriaId":"28EE6470-24FD-49D1-A2F0-7A19B290A161"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4.0","versionEndExcluding":"3.4.16","matchCriteriaId":"758A9E8F-0C52-43D9-8D84-69622B345A4E"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.0","versionEndExcluding":"3.5.14","matchCriteriaId":"D23096A1-8269-46C5-9215-9098E87D0A24"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.0.6","matchCriteriaId":"12A166C5-8B55-4BA3-AA8B-6024A257D441"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"40973","Ordinal":"1","Title":"CVE-2026-40973","CVE":"CVE-2026-40973","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"40973","Ordinal":"1","NoteData":"A local attacker on the same host as the application may be able to take control of the directory used by `ApplicationTemp`. When `server.servlet.session.persistent` is set to `true` and the attack persists across application restarts, this may allow the attacker to read session information and hijack authenticated users or deploy a gadget chain and execute code as the application's user.\n\nAffected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); predictable temp directory / `ApplicationTemp` ownership verification. Versions that are no longer supported are also affected per vendor advisory.","Type":"Description","Title":"CVE-2026-40973"}]}}}