CVE-2016-1000027

CRITICAL

Pivotal Spring Framework <5.3.16 - RCE

Title source: llm

Description

Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.

Exploits (6)

nomisec WORKING POC 12 stars
by artem-smotrakov · poc
https://github.com/artem-smotrakov/cve-2016-1000027-poc
github WORKING POC 5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/spring-CVE-2016-1000027
nomisec WRITEUP 2 stars
by tina94happy · poc
https://github.com/tina94happy/Spring-Web-5xx-Mitigated-version
nomisec WORKING POC
by Ragatzino · poc
https://github.com/Ragatzino/test-cve-2016-1000027
gitlab STUB
by imdsafiqul842 · poc
https://gitlab.com/imdsafiqul842/spring-cve-2016-1000027
nomisec WRITEUP
by yihtserns · poc
https://github.com/yihtserns/spring-web-without-remoting

Scores

CVSS v3 9.8
EPSS 0.6042
EPSS Percentile 98.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502
Status published

Affected Products (2)

vmware/spring_framework < 6.0.0
org.springframework/spring-web < 6.0.0Maven

Timeline

Published Jan 02, 2020
Tracked Since Feb 18, 2026