CVE-2026-22750 (GCVE-0-2026-22750)
Vulnerability from cvelistv5
Published
2026-04-10 07:32
Modified
2026-04-10 12:59
Severity ?
VLAI Severity ?
EPSS score ?
Summary
When configuring SSL bundles in Spring Cloud Gateway by using the configuration property spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.
Note: The 4.2.x branch is no longer under open source support. If you are using Spring Cloud Gateway 4.2.0 and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway 4.2.x release newer than 4.2.0 available on Maven Centeral https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/ . Ideally if you are not an enterprise customer, you should be upgrading to 5.0.2 or 5.1.1 which are the current supported open source releases.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| VMware | Spring Cloud Gateway |
Version: 4.2.0 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-22750",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-10T12:59:10.606788Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-15",
"description": "CWE-15 External Control of System or Configuration Setting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-10T12:59:14.451Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "Spring Cloud Gateway",
"product": "Spring Cloud Gateway",
"vendor": "VMware",
"versions": [
{
"lessThan": "4.2.1",
"status": "affected",
"version": "4.2.0",
"versionType": "ENTERPRISE"
}
]
}
],
"datePublic": "2026-04-09T14:15:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "When configuring SSL bundles in Spring Cloud Gateway by using the configuration property\u0026nbsp;\u003ccode\u003espring.ssl.bundle\u003c/code\u003e, the configuration was silently ignored and the default SSL configuration was used instead.\u003cbr\u003eNote: The\u0026nbsp;\u003ccode\u003e4.2.x\u003c/code\u003e\u0026nbsp;branch is no longer under open source support. If you are using Spring Cloud Gateway\u0026nbsp;\u003ccode\u003e4.2.0\u003c/code\u003e\u0026nbsp;and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway\u0026nbsp;\u003ccode\u003e4.2.x\u003c/code\u003e\u0026nbsp;release newer than\u0026nbsp;\u003ccode\u003e4.2.0\u003c/code\u003e\u0026nbsp;\u003ca href=\"https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/\"\u003eavailable on Maven Centeral\u003c/a\u003e. Ideally if you are not an enterprise customer, you should be upgrading to\u0026nbsp;\u003ccode\u003e5.0.2\u003c/code\u003e\u0026nbsp;or\u0026nbsp;\u003ccode\u003e5.1.1\u003c/code\u003e\u0026nbsp;which are the current supported open source releases."
}
],
"value": "When configuring SSL bundles in Spring Cloud Gateway by using the configuration property\u00a0spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.\nNote: The\u00a04.2.x\u00a0branch is no longer under open source support. If you are using Spring Cloud Gateway\u00a04.2.0\u00a0and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway\u00a04.2.x\u00a0release newer than\u00a04.2.0\u00a0 available on Maven Centeral https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/ . Ideally if you are not an enterprise customer, you should be upgrading to\u00a05.0.2\u00a0or\u00a05.1.1\u00a0which are the current supported open source releases."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-10T07:32:31.260Z",
"orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"shortName": "vmware"
},
"references": [
{
"url": "https://spring.io/security/cve-2026-22750"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "SSL bundle configuration silently bypassed in Spring Cloud Gateway",
"x_generator": {
"engine": "Vulnogram 1.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"assignerShortName": "vmware",
"cveId": "CVE-2026-22750",
"datePublished": "2026-04-10T07:32:31.260Z",
"dateReserved": "2026-01-09T06:55:03.990Z",
"dateUpdated": "2026-04-10T12:59:14.451Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-22750\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-10T12:59:10.606788Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-15\", \"description\": \"CWE-15 External Control of System or Configuration Setting\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-10T12:59:00.656Z\"}}], \"cna\": {\"title\": \"SSL bundle configuration silently bypassed in Spring Cloud Gateway\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"VMware\", \"product\": \"Spring Cloud Gateway\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.2.0\", \"lessThan\": \"4.2.1\", \"versionType\": \"ENTERPRISE\"}], \"packageName\": \"Spring Cloud Gateway\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-04-09T14:15:00.000Z\", \"references\": [{\"url\": \"https://spring.io/security/cve-2026-22750\"}], \"x_generator\": {\"engine\": \"Vulnogram 1.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"When configuring SSL bundles in Spring Cloud Gateway by using the configuration property\\u00a0spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.\\nNote: The\\u00a04.2.x\\u00a0branch is no longer under open source support. If you are using Spring Cloud Gateway\\u00a04.2.0\\u00a0and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway\\u00a04.2.x\\u00a0release newer than\\u00a04.2.0\\u00a0 available on Maven Centeral https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/ . Ideally if you are not an enterprise customer, you should be upgrading to\\u00a05.0.2\\u00a0or\\u00a05.1.1\\u00a0which are the current supported open source releases.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"When configuring SSL bundles in Spring Cloud Gateway by using the configuration property\u0026nbsp;\u003ccode\u003espring.ssl.bundle\u003c/code\u003e, the configuration was silently ignored and the default SSL configuration was used instead.\u003cbr\u003eNote: The\u0026nbsp;\u003ccode\u003e4.2.x\u003c/code\u003e\u0026nbsp;branch is no longer under open source support. If you are using Spring Cloud Gateway\u0026nbsp;\u003ccode\u003e4.2.0\u003c/code\u003e\u0026nbsp;and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway\u0026nbsp;\u003ccode\u003e4.2.x\u003c/code\u003e\u0026nbsp;release newer than\u0026nbsp;\u003ccode\u003e4.2.0\u003c/code\u003e\u0026nbsp;\u003ca href=\\\"https://repo1.maven.org/maven2/org/springframework/cloud/spring-cloud-gateway/\\\"\u003eavailable on Maven Centeral\u003c/a\u003e. Ideally if you are not an enterprise customer, you should be upgrading to\u0026nbsp;\u003ccode\u003e5.0.2\u003c/code\u003e\u0026nbsp;or\u0026nbsp;\u003ccode\u003e5.1.1\u003c/code\u003e\u0026nbsp;which are the current supported open source releases.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2026-04-10T07:32:31.260Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-22750\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-10T12:59:14.451Z\", \"dateReserved\": \"2026-01-09T06:55:03.990Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2026-04-10T07:32:31.260Z\", \"assignerShortName\": \"vmware\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…