Bypass Vulnerability in Spring Framework Affecting Multiple Versions
CVE-2025-22233

3.1LOW

Key Information:

Vendor

Spring

Vendor
CVE Published:
16 May 2025

What is CVE-2025-22233?

The vulnerability allows unauthorized bypass of security checks surrounding disallowedFields patterns and request parameter names in the Spring Framework. Despite previous enhancements for locale-independent, lowercase conversions, certain scenarios can still exploit these checks, potentially leading to unauthorized data binding. It is critical for users operating on affected versions ranging from 5.3.x to 6.2.x to upgrade to the specified fixed versions. Implementing best practices, such as using a dedicated model object for data binding and switching from disallowedFields to an allowedFields list, is highly advised to enhance security.

Affected Version(s)

Spring Framework 6.2.0 <= 6.2.6

Spring Framework 6.2.0 <= 6.2.6

Spring Framework 6.1.0 <= 6.1.19

References

CVSS V3.1

Score:
3.1
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-22233 : Bypass Vulnerability in Spring Framework Affecting Multiple Versions