
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
CVE-2025-41253 is a security vulnerability affecting Spring Cloud Gateway Server Webflux that allows attackers to expose environment variables and system properties. The vulnerability was discovered and disclosed on October 15, 2025, impacting multiple versions of Spring Cloud Gateway including versions 4.3.0-4.3.x, 4.2.0-4.2.x, 4.1.0-4.1.x, 4.0.0-4.0.x, and 3.1.0-3.1.x (Spring Security, Security Online).
The vulnerability stems from the misuse of Spring Expression Language (SpEL) within application routes in Spring Cloud Gateway Server Webflux. The flaw has received a CVSS v3.1 base score of 7.5 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. It is classified as CWE-917 (Improper Neutralization of Special Elements used in an Expression Language Statement). The vulnerability specifically affects applications using Spring Cloud Gateway Server Webflux, while Spring Cloud Gateway Server WebMVC is not affected (NVD, Security Online).
When exploited, this vulnerability allows attackers to read environment variables, system properties, and other sensitive data from the application's runtime environment. This could potentially lead to the exposure of authentication tokens, API keys, or database credentials (Security Online).
Spring has released fixed versions including 4.3.2 (OSS), 4.2.6 (OSS), 4.1.12 (Commercial), and 3.1.12 (Commercial). For users unable to upgrade immediately, the recommended workaround is to remove 'gateway' from the management.endpoints.web.exposure.include property or secure the actuator endpoints (Security Online).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"