CVE-2026-22745
Denial of Service in Spring MVC/WebFlux Static Resource Handling on Windows
Publication date: 2026-04-29
Last updated on: 2026-05-04
Assigner: VMware
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vmware | spring_framework | to 5.3.48 (exc) |
| vmware | spring_framework | From 6.1.0 (inc) to 6.1.27 (exc) |
| vmware | spring_framework | From 6.2.0 (inc) to 6.2.18 (exc) |
| vmware | spring_framework | From 7.0.0 (inc) to 7.0.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-22745 is a medium-severity Denial of Service (DoS) vulnerability that affects Spring MVC and Spring WebFlux applications when they serve static resources from the file system on Windows platforms.
The vulnerability occurs because an attacker can send malicious requests that are slow to resolve, which keep HTTP connections occupied and lead to resource exhaustion.
This causes the application to become unavailable or unresponsive, resulting in a Denial of Service.
- The application must be using Spring MVC or Spring WebFlux.
- The application must be serving static resources directly from the file system.
- The application must be running on a Windows operating system.
Can you explain this vulnerability to me?
CVE-2026-22745 is a medium-severity Denial of Service (DoS) vulnerability that affects Spring MVC and Spring WebFlux applications when they serve static resources from the file system on Windows platforms.
The vulnerability occurs because malicious requests that are slow to resolve can keep HTTP connections occupied, which leads to resource exhaustion and causes the application to become unavailable.
- The application must be using Spring MVC or Spring WebFlux frameworks.
- The application must be serving static resources directly from the file system.
- The application must be running on a Windows operating system.
How can this vulnerability impact me? :
This vulnerability can impact you by causing a Denial of Service (DoS) on your application.
An attacker can send specially crafted slow-to-resolve requests that keep HTTP connections in use, exhausting server resources and making the application unavailable to legitimate users.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade your Spring Framework to a fixed version as follows:
- Upgrade 7.0.x versions to 7.0.7 (Open Source)
- Upgrade 6.2.x versions to 6.2.18 (Open Source)
- Upgrade 6.1.x versions to 6.1.27 (Commercial)
- Upgrade 5.3.x versions to 5.3.48 (Commercial)
No additional mitigation steps are required beyond upgrading.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability impact me? :
This vulnerability can impact you by causing your Spring MVC or WebFlux application to become unavailable due to a Denial of Service attack.
An attacker can exploit this issue by sending slow-to-resolve malicious requests that keep HTTP connections in use, exhausting server resources.
As a result, legitimate users may be unable to access the application or its services, leading to downtime and potential loss of business or user trust.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade your Spring Framework to a fixed version.
- Upgrade Spring Framework 7.0.x to 7.0.7 (Open Source)
- Upgrade Spring Framework 6.2.x to 6.2.18 (Open Source)
- Upgrade Spring Framework 6.1.x to 6.1.27 (Commercial)
- Upgrade Spring Framework 5.3.x to 5.3.48 (Commercial)
No additional mitigation steps are required beyond upgrading.