CVE-2025-41253

7.5 HIGH

📋 TL;DR

Spring Cloud Gateway Server Webflux versions with exposed actuator endpoints can allow attackers to read environment variables and system properties via SpEL expressions in routes. This affects applications using Spring Cloud Gateway Server Webflux with unsecured actuator endpoints enabled. Spring Cloud Gateway Server WebMVC is not vulnerable.

💻 Affected Systems

Products:
  • Spring Cloud Gateway Server Webflux
Versions: Specific versions not provided in CVE description, check vendor advisory
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Requires specific configuration: Spring Cloud Gateway Server Webflux with actuator endpoints enabled and exposed, plus SpEL access to environment variables/system properties in routes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive environment variables containing API keys, database credentials, encryption keys, or other secrets, leading to full system compromise.

🟠

Likely Case

Information disclosure of configuration data, potentially exposing credentials or sensitive system information that could enable further attacks.

🟢

If Mitigated

Limited or no impact if actuator endpoints are properly secured or disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to exposed actuator endpoints and knowledge of SpEL syntax to access environment variables.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Spring Security advisory for specific patched versions

Vendor Advisory: https://spring.io/security/cve/2025-41253

Restart Required: Yes

Instructions:

1. Check Spring Security advisory for patched versions. 2. Update Spring Cloud Gateway Server Webflux to patched version. 3. Restart application. 4. Verify actuator endpoints are properly secured.

🔧 Temporary Workarounds

Disable actuator endpoints

all

Disable the gateway actuator endpoint to prevent exploitation

management.endpoint.gateway.enabled=false

Restrict actuator access

all

Limit exposure of actuator endpoints

management.endpoints.web.exposure.include=health,info
management.endpoint.gateway.access=restricted

🧯 If You Can't Patch

  • Disable or restrict access to actuator endpoints via configuration
  • Implement network-level controls to limit access to actuator endpoints

🔍 How to Verify

Check if Vulnerable:

Check if application uses Spring Cloud Gateway Server Webflux with management.endpoints.web.exposure.include containing 'gateway' and management.endpoint.gateway.enabled=true or unrestricted access.

Check Version:

Check application dependencies for Spring Cloud Gateway version

Verify Fix Applied:

Verify Spring Cloud Gateway Server Webflux version is patched and actuator endpoints are properly secured or disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /actuator/gateway endpoints
  • SpEL expressions accessing env or system properties in logs

Network Indicators:

  • HTTP requests to actuator endpoints from unexpected sources

SIEM Query:

source_ip NOT IN trusted_ips AND uri_path CONTAINS '/actuator/gateway'

🔗 References

📤 Share & Export