CVE-2016-1000027
CRITICALPivotal Spring Framework <5.3.16 - RCE
Title source: llmDescription
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
Exploits (6)
nomisec
WORKING POC
12 stars
by artem-smotrakov · poc
https://github.com/artem-smotrakov/cve-2016-1000027-poc
github
WORKING POC
5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/spring-CVE-2016-1000027
nomisec
WRITEUP
2 stars
by tina94happy · poc
https://github.com/tina94happy/Spring-Web-5xx-Mitigated-version
References (9)
Scores
CVSS v3
9.8
EPSS
0.6042
EPSS Percentile
98.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (2)
vmware/spring_framework
< 6.0.0
org.springframework/spring-web
< 6.0.0Maven
Timeline
Published
Jan 02, 2020
Tracked Since
Feb 18, 2026