CVE-2025-41232 (GCVE-0-2025-41232)
Vulnerability from cvelistv5
Published
2025-05-21 10:23
Modified
2025-05-22 03:55
Severity ?
Summary
Spring Security Aspects may not correctly locate method security annotations on private methods. This can cause an authorization bypass. Your application may be affected by this if the following are true: * You are using @EnableMethodSecurity(mode=ASPECTJ) and spring-security-aspects, and * You have Spring Security method annotations on a private method In that case, the target method may be able to be invoked without proper authorization. You are not affected if: * You are not using @EnableMethodSecurity(mode=ASPECTJ) or spring-security-aspects, or * You have no Spring Security-annotated private methods
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41232",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-21T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-693",
                "description": "CWE-693 Protection Mechanism Failure",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-22T03:55:15.247Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "Spring Security",
          "product": "Spring Security",
          "vendor": "Spring",
          "versions": [
            {
              "lessThan": "6.4.6",
              "status": "affected",
              "version": "6.4.x",
              "versionType": "oss"
            }
          ]
        }
      ],
      "datePublic": "2025-05-19T10:19:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eSpring Security Aspects may not correctly locate method security annotations on private methods. This can cause an authorization bypass.\u003c/p\u003e\u003cp\u003eYour application may be affected by this if the following are true:\u003c/p\u003e\u003col\u003e\u003cli\u003eYou are using \u003ccode\u003e@EnableMethodSecurity(mode=ASPECTJ)\u003c/code\u003e\u0026nbsp;and \u003ccode\u003espring-security-aspects\u003c/code\u003e, and\u003c/li\u003e\u003cli\u003eYou have Spring Security method annotations on a private method\u003c/li\u003e\u003c/ol\u003e\u003cp\u003eIn that case, the target method may be able to be invoked without proper authorization.\u003c/p\u003e\u003cp\u003eYou are not affected if:\u003c/p\u003e\u003col\u003e\u003cli\u003eYou are not using \u003ccode\u003e@EnableMethodSecurity(mode=ASPECTJ)\u003c/code\u003e\u0026nbsp;or \u003ccode\u003espring-security-aspects\u003c/code\u003e, or\u003c/li\u003e\u003cli\u003eYou have no Spring Security-annotated private methods\u003c/li\u003e\u003c/ol\u003e\u003cbr\u003e"
            }
          ],
          "value": "Spring Security Aspects may not correctly locate method security annotations on private methods. This can cause an authorization bypass.\n\nYour application may be affected by this if the following are true:\n\n  *  You are using @EnableMethodSecurity(mode=ASPECTJ)\u00a0and spring-security-aspects, and\n  *  You have Spring Security method annotations on a private method\nIn that case, the target method may be able to be invoked without proper authorization.\n\nYou are not affected if:\n\n  *  You are not using @EnableMethodSecurity(mode=ASPECTJ)\u00a0or spring-security-aspects, or\n  *  You have no Spring Security-annotated private methods"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-21T10:23:07.078Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "http://spring.io/security/cve-2025-41232"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "CVE-2025-41232: Spring Security authorization bypass for method security annotations on private methods",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2025-41232",
    "datePublished": "2025-05-21T10:23:07.078Z",
    "dateReserved": "2025-04-16T09:29:46.972Z",
    "dateUpdated": "2025-05-22T03:55:15.247Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-41232\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2025-05-21T12:16:21.993\",\"lastModified\":\"2025-05-21T20:24:58.133\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Spring Security Aspects may not correctly locate method security annotations on private methods. This can cause an authorization bypass.\\n\\nYour application may be affected by this if the following are true:\\n\\n  *  You are using @EnableMethodSecurity(mode=ASPECTJ)\u00a0and spring-security-aspects, and\\n  *  You have Spring Security method annotations on a private method\\nIn that case, the target method may be able to be invoked without proper authorization.\\n\\nYou are not affected if:\\n\\n  *  You are not using @EnableMethodSecurity(mode=ASPECTJ)\u00a0or spring-security-aspects, or\\n  *  You have no Spring Security-annotated private methods\"},{\"lang\":\"es\",\"value\":\"Es posible que Spring Security Aspects no ubique correctamente las anotaciones de seguridad de m\u00e9todos en m\u00e9todos privados. Esto puede provocar una omisi\u00f3n de autorizaci\u00f3n. Su aplicaci\u00f3n podr\u00eda verse afectada si se cumplen las siguientes condiciones: * Utiliza @EnableMethodSecurity(mode=ASPECTJ) y spring-security-aspects, y * Tiene anotaciones de m\u00e9todo de Spring Security en un m\u00e9todo privado. En ese caso, el m\u00e9todo de destino podr\u00eda invocarse sin la autorizaci\u00f3n correspondiente. No se ver\u00e1 afectado si: * No utiliza @EnableMethodSecurity(mode=ASPECTJ) ni spring-security-aspects, o * No tiene m\u00e9todos privados anotados por Spring Security.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-693\"}]}],\"references\":[{\"url\":\"http://spring.io/security/cve-2025-41232\",\"source\":\"security@vmware.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-41232\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-21T13:48:23.040837Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-693\", \"description\": \"CWE-693 Protection Mechanism Failure\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-21T13:48:09.087Z\"}}], \"cna\": {\"title\": \"CVE-2025-41232: Spring Security authorization bypass for method security annotations on private methods\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Spring\", \"product\": \"Spring Security\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.4.x\", \"lessThan\": \"6.4.6\", \"versionType\": \"oss\"}], \"packageName\": \"Spring Security\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2025-05-19T10:19:00.000Z\", \"references\": [{\"url\": \"http://spring.io/security/cve-2025-41232\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Spring Security Aspects may not correctly locate method security annotations on private methods. This can cause an authorization bypass.\\n\\nYour application may be affected by this if the following are true:\\n\\n  *  You are using @EnableMethodSecurity(mode=ASPECTJ)\\u00a0and spring-security-aspects, and\\n  *  You have Spring Security method annotations on a private method\\nIn that case, the target method may be able to be invoked without proper authorization.\\n\\nYou are not affected if:\\n\\n  *  You are not using @EnableMethodSecurity(mode=ASPECTJ)\\u00a0or spring-security-aspects, or\\n  *  You have no Spring Security-annotated private methods\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eSpring Security Aspects may not correctly locate method security annotations on private methods. This can cause an authorization bypass.\u003c/p\u003e\u003cp\u003eYour application may be affected by this if the following are true:\u003c/p\u003e\u003col\u003e\u003cli\u003eYou are using \u003ccode\u003e@EnableMethodSecurity(mode=ASPECTJ)\u003c/code\u003e\u0026nbsp;and \u003ccode\u003espring-security-aspects\u003c/code\u003e, and\u003c/li\u003e\u003cli\u003eYou have Spring Security method annotations on a private method\u003c/li\u003e\u003c/ol\u003e\u003cp\u003eIn that case, the target method may be able to be invoked without proper authorization.\u003c/p\u003e\u003cp\u003eYou are not affected if:\u003c/p\u003e\u003col\u003e\u003cli\u003eYou are not using \u003ccode\u003e@EnableMethodSecurity(mode=ASPECTJ)\u003c/code\u003e\u0026nbsp;or \u003ccode\u003espring-security-aspects\u003c/code\u003e, or\u003c/li\u003e\u003cli\u003eYou have no Spring Security-annotated private methods\u003c/li\u003e\u003c/ol\u003e\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2025-05-21T10:23:07.078Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-41232\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-22T03:55:15.247Z\", \"dateReserved\": \"2025-04-16T09:29:46.972Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2025-05-21T10:23:07.078Z\", \"assignerShortName\": \"vmware\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…