CVE-2026-40971
Received Received - Intake
SSL Hostname Verification Bypass in Spring Boot RabbitMQ Auto-Config

Publication date: 2026-04-27

Last updated on: 2026-04-27

Assigner: VMware

Description
When configured to use an SSL bundle, Spring Boot's RabbitMQ auto-configuration does not perform hostname verification when connecting to the RabbitMQ broker. Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14) per vendor advisory.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-27
Last Modified
2026-04-27
Generated
2026-05-06
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
vmware spring_boot From 4.0.0 (inc) to 4.0.5 (inc)
vmware spring_boot From 3.5.0 (inc) to 3.5.13 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-295 The product does not validate, or incorrectly validates, a certificate.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade Spring Boot to version 4.0.6 or later if you are using the 4.0.x series, or to version 3.5.14 or later if you are using the 3.5.x series.

This update fixes the issue where hostname verification is not performed when connecting to the RabbitMQ broker using an SSL bundle.


Can you explain this vulnerability to me?

This vulnerability occurs in Spring Boot's RabbitMQ auto-configuration when it is set up to use an SSL bundle. Specifically, the system does not perform hostname verification when connecting to the RabbitMQ broker.

Hostname verification is a security measure that ensures the server you are connecting to is the one you expect by checking the server's hostname against the SSL certificate. Without this verification, an attacker could potentially intercept or redirect the connection.


How can this vulnerability impact me? :

The lack of hostname verification when connecting to the RabbitMQ broker can lead to man-in-the-middle attacks. An attacker could impersonate the RabbitMQ server, intercepting or altering the data transmitted between your application and the broker.

This can result in confidentiality, integrity, and availability impacts, as indicated by the CVSS score which rates the impact on confidentiality, integrity, and availability as low.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart