VMware Spring Cloud Gateway
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in VMware Spring Cloud Gateway.
Recent VMware Spring Cloud Gateway Security Advisories
| Advisory | Title | Published |
|---|---|---|
| 2025-09-08 | CVE-2025-41243 - Critical - CVE-2025-41243: Spring Expression Language property modification using Spring Cloud Gateway Server WebFlux | September 8, 2025 |
| 2025-05-27 | CVE-2025-41235 - High - CVE-2025-41235: Spring Cloud Gateway Server Forwards Headers from Untrusted Proxies | May 27, 2025 |
By the Year
In 2026 there have been 0 vulnerabilities in VMware Spring Cloud Gateway. Last year, in 2025 Spring Cloud Gateway had 2 security vulnerabilities published. Right now, Spring Cloud Gateway is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 2 | 7.50 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 2 | 7.75 |
| 2021 | 1 | 6.50 |
It may take a day or so for new Spring Cloud Gateway vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent VMware Spring Cloud Gateway Security Vulnerabilities
Spring Cloud Gateway Webflux Exposes Env Vars via SpEL
CVE-2025-41253
7.5 - High
- October 16, 2025
The following versions of Spring Cloud Gateway Server Webflux may be vulnerable to the ability to expose environment variables and system properties to attackers. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * An admin or untrusted third party using Spring Expression Language (SpEL) to access environment variables or system properties via routes. * An untrusted third party could create a route that uses SpEL to access environment variables or system properties if: * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway and management.endpoint.gateway.enabled=trueor management.endpoint.gateway.access=unrestricte. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
EL Injection
Spring Cloud Gateway X-Forwarded-For header injection via untrusted proxies
CVE-2025-41235
- May 30, 2025
Spring Cloud Gateway Server forwards the X-Forwarded-For and Forwarded headers from untrusted proxies.
In spring cloud gateway versions prior to 3.1.1+ , applications
CVE-2022-22946
5.5 - Medium
- March 04, 2022
In spring cloud gateway versions prior to 3.1.1+ , applications that are configured to enable HTTP2 and no key store or trusted certificates are set will be configured to use an insecure TrustManager. This makes the gateway able to connect to remote services with invalid or custom certificates.
Improper Certificate Validation
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+
CVE-2022-22947
10 - Critical
- March 03, 2022
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Code Injection
Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests
CVE-2021-22051
6.5 - Medium
- November 08, 2021
Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer.
AuthZ
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for VMware Spring Cloud Gateway or by VMware? Click the Watch button to subscribe.