Spring Cloud Gateway VMware Spring Cloud Gateway

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in VMware Spring Cloud Gateway.

Recent VMware Spring Cloud Gateway Security Advisories

Advisory Title Published
2025-09-08 CVE-2025-41243 - Critical - CVE-2025-41243: Spring Expression Language property modification using Spring Cloud Gateway Server WebFlux September 8, 2025
2025-05-27 CVE-2025-41235 - High - CVE-2025-41235: Spring Cloud Gateway Server Forwards Headers from Untrusted Proxies May 27, 2025

By the Year

In 2026 there have been 0 vulnerabilities in VMware Spring Cloud Gateway. Last year, in 2025 Spring Cloud Gateway had 2 security vulnerabilities published. Right now, Spring Cloud Gateway is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 2 7.50
2024 0 0.00
2023 0 0.00
2022 2 7.75
2021 1 6.50

It may take a day or so for new Spring Cloud Gateway vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent VMware Spring Cloud Gateway Security Vulnerabilities

Spring Cloud Gateway Webflux Exposes Env Vars via SpEL
CVE-2025-41253 7.5 - High - October 16, 2025

The following versions of Spring Cloud Gateway Server Webflux may be vulnerable to the ability to expose environment variables and system properties to attackers. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * An admin or untrusted third party using Spring Expression Language (SpEL) to access environment variables or system properties via routes. * An untrusted third party could create a route that uses SpEL to access environment variables or system properties if: * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway and management.endpoint.gateway.enabled=trueor management.endpoint.gateway.access=unrestricte. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.

EL Injection

Spring Cloud Gateway X-Forwarded-For header injection via untrusted proxies
CVE-2025-41235 - May 30, 2025

Spring Cloud Gateway Server forwards the X-Forwarded-For and Forwarded headers from untrusted proxies.

In spring cloud gateway versions prior to 3.1.1+ , applications
CVE-2022-22946 5.5 - Medium - March 04, 2022

In spring cloud gateway versions prior to 3.1.1+ , applications that are configured to enable HTTP2 and no key store or trusted certificates are set will be configured to use an insecure TrustManager. This makes the gateway able to connect to remote services with invalid or custom certificates.

Improper Certificate Validation

In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+
CVE-2022-22947 10 - Critical - March 03, 2022

In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.

Code Injection

Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests
CVE-2021-22051 6.5 - Medium - November 08, 2021

Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer.

AuthZ

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for VMware Spring Cloud Gateway or by VMware? Click the Watch button to subscribe.

VMware
Vendor

subscribe