CVE-2024-22233
Jenkins vulnerability analysis and mitigation

Overview

CVE-2024-22233 is a high-severity vulnerability (CVSS 7.5) discovered in Spring Framework versions 6.0.15 and 6.1.2. The vulnerability was disclosed on January 22, 2024, affecting applications that use Spring MVC with Spring Security 6.1.6+ or 6.2.1+ on the classpath. These versions are respectively being used by Spring Boot 3.1.7 and 3.2.1 (Spring Advisory).

Technical details

The vulnerability allows attackers to provide specially crafted HTTP requests that can trigger a denial-of-service (DoS) condition. The vulnerability specifically affects applications that meet two conditions: using Spring MVC and having Spring Security 6.1.6+ or 6.2.1+ in the classpath. Typically, Spring Boot applications are vulnerable when they include both org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies (Spring Advisory, Security Online).

Impact

When successfully exploited, this vulnerability can lead to a denial-of-service (DoS) condition, potentially making the affected application unavailable to legitimate users (Spring Advisory).

Mitigation and workarounds

Users of affected versions should upgrade their Spring Framework installations: Spring Framework 6.0.15 users should upgrade to 6.0.16, and Spring Framework 6.1.2 users should upgrade to 6.1.3. The Spring Boot 3.1.8 and 3.2.2 releases shipped with the relevant fixed Spring Framework versions (Spring Advisory, Spring Blog).

Community reactions

The vulnerability was identified and responsibly reported by multiple security researchers including Aleksander Blomskøld, LiveOverflow (hextree.io), ZetaTwo, anasbekar, zzgoon, 0xLegacyy, xyzeva, and AcroTiger (Spring Advisory).

Additional resources


SourceThis report was generated using AI

Related Jenkins vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67641MEDIUM5.4
  • JavaJava
  • jenkins
NoYesDec 10, 2025
CVE-2025-67640MEDIUM5
  • JavaJava
  • org.jenkins-ci.plugins:git-client
NoYesDec 10, 2025
CVE-2025-67642MEDIUM4.3
  • JavaJava
  • com.datapipe.jenkins.plugins:hashicorp-vault-plugin
NoNoDec 10, 2025
CVE-2025-67638MEDIUM4.3
  • JavaJava
  • org.jenkins-ci.main:jenkins-core
NoYesDec 10, 2025
CVE-2025-67639LOW3.5
  • JavaJava
  • cpe:2.3:a:jenkins:jenkins
NoYesDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management