CVE-2025-41243
Java vulnerability analysis and mitigation

Overview

Spring Cloud Gateway Server Webflux contains a critical vulnerability (CVE-2025-41243) that enables Spring Environment property modification. The vulnerability was discovered and disclosed on September 8, 2025, affecting multiple versions of Spring Cloud Gateway from 3.1.0 through 4.3.x. This critical security flaw has been assigned the maximum CVSS score of 10.0, indicating its severe nature (Spring Security, NVD).

Technical details

The vulnerability is specifically a Spring Expression Language (SpEL) injection vulnerability in the Spring Cloud Gateway actuator endpoint. The flaw exists in the GatewayEvaluationContext constructor, which creates an overly permissive evaluation context that doesn't disable property assignment. The vulnerability is present when specific conditions are met: the application uses Spring Cloud Gateway Server Webflux (WebMVC is not affected), Spring Boot actuator is a dependency, and the actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. The vulnerability has been assigned CWE-94 (Improper Control of Generation of Code) and CWE-917 (Improper Neutralization of Special Elements used in an Expression Language Statement) (Miggo).

Impact

The vulnerability allows attackers to manipulate sensitive Spring Environment properties, potentially leading to remote code execution and compromise of application behavior. Given its deployment in microservices architectures as a reactive API gateway, often at network edges, successful exploitation could provide attackers with direct manipulation access to application runtime properties (Security Online).

Mitigation and workarounds

Users of affected versions should upgrade to the following fixed versions: 4.3.x to 4.3.1 (OSS), 4.2.x to 4.2.5 (OSS), 4.1.x to 4.1.11 (Enterprise), and 3.1.x to 3.1.11 (Enterprise). For those unable to upgrade immediately, alternative mitigations include removing gateway from the management.endpoints.web.exposure.include property or implementing proper security controls for actuator endpoints (Spring Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66516CRITICAL10
  • JavaJava
  • tika
NoYesDec 04, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • org.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
CVE-2025-11222MEDIUM6.1
  • JavaJava
  • com.linecorp.centraldogma:centraldogma-server-auth-shiro
NoYesDec 04, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management