CVE-2026-40981

HIGH

Spring Cloud Config Authorization Bypass via Google Secrets Manager

Title source: llm
STIX 2.1

Description

When using Google Secrets Manager as a backend for the Spring Cloud Config server a client can craft a request to the config server potentially exposing secrets from unintended GCP projects. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.

References (1)

Core 1

Scores

CVSS v3 7.5
EPSS 0.0002
EPSS Percentile 5.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-639
Status published
Products (11)
org.springframework.cloud/spring-cloud-config 3.1.0 - 3.1.13Maven
org.springframework.cloud/spring-cloud-config 4.1.0 - 4.1.9Maven
org.springframework.cloud/spring-cloud-config 4.2.0 - 4.2.6Maven
org.springframework.cloud/spring-cloud-config 4.3.0 - 4.3.3Maven
org.springframework.cloud/spring-cloud-config 5.0.0 - 5.0.3Maven
Spring/Spring Cloud Config 3.1.0 - 3.1.14
Spring/Spring Cloud Config 4.1.0 - 4.1.10
Spring/Spring Cloud Config 4.2.0 - 4.2.7
Spring/Spring Cloud Config 4.3.0 - 4.3.3
Spring/Spring Cloud Config 5.0.0 - 5.0.3
... and 1 more
Published May 07, 2026
Tracked Since May 07, 2026