CVE-2025-22235

HIGH

Spring Security - Info Disclosure

Title source: llm

Description

EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed. Your application may be affected by this if all the following conditions are met: * You use Spring Security * EndpointRequest.to() has been used in a Spring Security chain configuration * The endpoint which EndpointRequest references is disabled or not exposed via web * Your application handles requests to /null and this path needs protection You are not affected if any of the following is true: * You don't use Spring Security * You don't use EndpointRequest.to() * The endpoint which EndpointRequest.to() refers to is enabled and is exposed * Your application does not handle requests to /null or this path does not need protection

Exploits (1)

nomisec WORKING POC
by idealzh · poc
https://github.com/idealzh/cve-2025-22235-demo

Scores

CVSS v3 7.3
EPSS 0.0039
EPSS Percentile 60.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Details

CWE
CWE-20
Status published
Products (6)
org.springframework.boot/spring-boot 0Maven
Spring/Spring Boot 2.7.x - 2.7.25
Spring/Spring Boot 3.1.x - 3.1.16
Spring/Spring Boot 3.2.x - 3.2.14
Spring/Spring Boot 3.3.x - 3.3.11
Spring/Spring Boot 3.4.x - 3.4.5
Published Apr 28, 2025
Tracked Since Feb 18, 2026