2,300+
Enterprise Clients
TuxCare’s Upcoming Webinars: STIG Security 101 [Sept 18th] & When Spring Ends: How to Securely Work with End-of-Life Spring Projects [Sept 19th]
NEW PATCHES AVAILABLE FOR CVE-2025-22235 and CVE-2025-22234. See all recently fixed Spring CVEs here.
Most Spring projects rely on Spring Framework and Spring Boot. While some releases are designated as long-term support (LTS), many receive community support for only 12 to 18 months. After end of life, security patches stop – leaving unmaintained systems exposed.
Minimize Security Risks
Get ongoing security patches for Spring vulnerabilities while you strategize your upgrade
Preserve Compatibility
Avoid code refactoring and keep your Spring applications running smoothly for years to come
Ensure Compliance
Gain 14-day SLAs for security fixes and establish transparency with detailed SBOMs for each library
Step 1
Get your ELS for Spring
access credentials
Step 2
Adjust your Maven/Gradle
configuration files
Step 3
Switch to the TuxCare versions
of your libraries
Endless Lifecycle Support (ELS) for Spring rapidly delivers fixes for vulnerabilities across many end-of-life versions of various
Spring projects. As new CVEs emerge, TuxCare proactively addresses them.
If your tech stack still relies on outdated Spring versions, your applications are exposed to the security risks listed below.
Switch to Endless Lifecycle Support for Spring in just a few steps to start safeguarding your applications right away.
CVE ID | Description | Severity | CWE-ID and name | Affected project | Affected versions | Publish date |
---|---|---|---|---|---|---|
CVE-2025-22235 | Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed | HIGH: 7.3 |
CWE-20: Improper Input Validation | Spring Boot | <2.7.0;2.7.24.2> <3.1.0;3.1.15.2> <3.2.0;3.2.13.2> <3.3.0;3.3.10> <3.4.0;3.4.4> |
April 24th 2025 |
CVE-2025-22234 | Spring Security BCryptPasswordEncoder maximum password length breaks timing attack mitigation | MEDIUM: 5.3 | CWE-693: Protection Mechanism Failure | Spring Security | 5.7.16 only 5.8.16.tuxcare only 5.8.16.tuxcare.1 only 5.8.16.tuxcare.2 only 5.8.18 only 6.0.16 only 6.1.14 only 6.2.10 only 6.3.8 only 6.4.4 only |
April 22nd 2025 |
CVE-2025-22228 | Spring Security BCryptPasswordEncoder does not enforce maximum password length | HIGH: 7.4 | CWE-287: Improper Authentication | Spring Security | 5.6.2 and older, <5.7.0;5.7.15>, <5.8.0;5.8.16>, <6.0.0;6.0.15>, <6.1.0;6.1.13>, <6.2.0;6.2.9>, <6.3.0;6.3.7>, <6.4.0;6.4.3> | March 19th 2025 |
CVE-2024-38827 | Spring Security Authorization Bypass for Case Sensitive Comparisons | CRITICAL: 9.1 | CWE-639: Authorization Bypass Through User-Controlled Key | Spring Security | <5.7.0;5.7.13>, <5.8.0;5.8.15>, <6.0.0;6.0.13>, <6.1.0;6.1.11>, <6.2.0;6.2.7>, <6.3.0;6.3.4> | November 19th 2024 |
CVE-2024-38829 | Spring LDAP sensitive data exposure for case-sensitive comparisons | LOW: 3.7 | CWE-178: Improper Handling of Case Sensitivity | Spring LDAP | All prior to 2.4.0, <2.4.0;2.4.3>, <3.0.0;3.0.9>, <3.1.0;3.1.7>, <3.2.0;3.2.7> | 19th November 2024 |
CVE-2024-38828 | DoS via Spring MVC controller method with byte[] parameter | MEDIUM: 5.3 | CWE-400: Uncontrolled Resource Consumption | Spring Framework | All prior to 5.3.0, <5.3.0;5.3.41> | 15th November 2024 |
CVE-2024-38821 | Authorization Bypass of Static Resources in WebFlux Applications | CRITICAL: 9.1 | CWE-770: Allocation of Resources Without Limits or Throttling | Spring Security | All prior to 5.7.13, <5.8.0;5.8.14>, <6.0.0;6.0.12>, <6.1.0;6.1.10>, <6.2.0;6.2.6>, <6.3.0;6.3.3> | 22nd of October 2024 |
We provide long-term security across your entire stack, supporting a wide and continually expanding set of open-source projects, libraries, and runtimes – all from a single, trusted partner.
We utilize advanced automation across CVE discovery, backporting, building, and release workflows to accelerate delivery and ensure the highest possible quality of security patches.
We go beyond surface-level scanning to uncover and fix hidden vulnerabilities deep in your dependency trees, securing the entire software supply chain with precision and scale.
Automated pipelines and mature workflows ensure rapid, reliable patch delivery backed by SLAs – giving you confidence in your risk management and compliance posture.
2,300+
Enterprise Clients
10,000+
Packages Supported
197,000+
Patches Delivered
5,000+
Vulnerabilities Fixed
10,000+
Linux Kernels Continuously Patched
60+
Linux Distro Versions Supported
Discover TuxCare’s SecureChain for Java to safeguard your entire Java tech stack so you can focus more on innovation. Our trusted repository offers secure, compliant Java libraries and packages, guaranteeing seamless operation without the need for resource-consuming code refactoring.