Check the status of CVEs. Learn More.
TuxCare’s Upcoming Webinars: STIG Security 101 [Sept 18th] & When Spring Ends: How to Securely Work with End-of-Life Spring Projects [Sept 19th]
Note: in 2.7.18.tuxcare.6 version we apply our patch for CVE-2025-22235 to the latest available open source community version as a baseline.
This CVE has been resolved by the TuxCare team and
a patch has been delivered to ELS for Spring users.
Spring Boot is a framework built on top of the Spring Framework that simplifies the development of standalone, production-ready Spring applications. It eliminates much of the boilerplate configuration required by traditional Spring apps by offering auto-configuration, opinionated defaults, and embedded servers.
Improper input validation takes place when the product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed.
Your application may be affected by this if all the following conditions are met:
You are not affected if any of the following is true:
This issue affects multiple versions of
Spring-boot-actuator-autconfigure package
Vulnerability Dossier | |
---|---|
CVE ID | CVE-2025-22235 |
Severity | HIGH: 7.3 |
CWE-ID and name | CWE-20: Improper Input Validation |
Affected project | Spring Boot |
Affected packages | spring-boot-actuator-autconfigure |
Affected versions | <2.7.0;2.7.24.2> <3.1.0;3.1.15.2> <3.2.0;3.2.13.2> <3.3.0;3.3.10> <3.4.0;3.4.4> |
NVD publish date | 28th of April 2025 |
TuxCare fixed version | 2.7.18.tuxcare.6 |
Fixed In: ELS for Spring Boot v2.7.18.TuxCare.6
In Spring Boot, the EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed.
Spring Boot 2.7.x is no longer supported by open source community as its End of Life date is 2023-06-30. It simply means that version from that date does not receive any updates to address this issue.
Users of the affected components should apply one of the following mitigations:
Do you need a fix for this vulnerability for any other Spring Boot version, please contact us, we are here to help you!