CVE-2026-22745
Received Received - Intake
Denial of Service in Spring MVC/WebFlux Static Resource Handling on Windows

Publication date: 2026-04-29

Last updated on: 2026-05-04

Assigner: VMware

Description
Spring MVC and WebFlux applications are vulnerable to Denial of Service attacks when resolving static resources. More precisely, an application can be vulnerable when all the following are true: * the application is using Spring MVC or Spring WebFlux * the application is serving static resources from the file system * the application is running on a Windows platform When all the conditions above are met, the attacker can send malicious requests that are slow to resolve and that can keep HTTP connections in use. This can cause a Denial of Service on the application.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-29
Last Modified
2026-05-04
Generated
2026-05-06
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
vmware spring_framework to 5.3.48 (exc)
vmware spring_framework From 6.1.0 (inc) to 6.1.27 (exc)
vmware spring_framework From 6.2.0 (inc) to 6.2.18 (exc)
vmware spring_framework From 7.0.0 (inc) to 7.0.7 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-22745 is a medium-severity Denial of Service (DoS) vulnerability that affects Spring MVC and Spring WebFlux applications when they serve static resources from the file system on Windows platforms.

The vulnerability occurs because an attacker can send malicious requests that are slow to resolve, which keep HTTP connections occupied and lead to resource exhaustion.

This causes the application to become unavailable or unresponsive, resulting in a Denial of Service.

  • The application must be using Spring MVC or Spring WebFlux.
  • The application must be serving static resources directly from the file system.
  • The application must be running on a Windows operating system.

Can you explain this vulnerability to me?

CVE-2026-22745 is a medium-severity Denial of Service (DoS) vulnerability that affects Spring MVC and Spring WebFlux applications when they serve static resources from the file system on Windows platforms.

The vulnerability occurs because malicious requests that are slow to resolve can keep HTTP connections occupied, which leads to resource exhaustion and causes the application to become unavailable.

  • The application must be using Spring MVC or Spring WebFlux frameworks.
  • The application must be serving static resources directly from the file system.
  • The application must be running on a Windows operating system.

How can this vulnerability impact me? :

This vulnerability can impact you by causing a Denial of Service (DoS) on your application.

An attacker can send specially crafted slow-to-resolve requests that keep HTTP connections in use, exhausting server resources and making the application unavailable to legitimate users.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade your Spring Framework to a fixed version as follows:

  • Upgrade 7.0.x versions to 7.0.7 (Open Source)
  • Upgrade 6.2.x versions to 6.2.18 (Open Source)
  • Upgrade 6.1.x versions to 6.1.27 (Commercial)
  • Upgrade 5.3.x versions to 5.3.48 (Commercial)

No additional mitigation steps are required beyond upgrading.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

This vulnerability can impact you by causing your Spring MVC or WebFlux application to become unavailable due to a Denial of Service attack.

An attacker can exploit this issue by sending slow-to-resolve malicious requests that keep HTTP connections in use, exhausting server resources.

As a result, legitimate users may be unable to access the application or its services, leading to downtime and potential loss of business or user trust.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade your Spring Framework to a fixed version.

  • Upgrade Spring Framework 7.0.x to 7.0.7 (Open Source)
  • Upgrade Spring Framework 6.2.x to 6.2.18 (Open Source)
  • Upgrade Spring Framework 6.1.x to 6.1.27 (Commercial)
  • Upgrade Spring Framework 5.3.x to 5.3.48 (Commercial)

No additional mitigation steps are required beyond upgrading.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart