CVE-2026-22739: Spring Cloud Config Server: Path Traversal via Profile Parameter Allows Arbitrary File Access
(updated )
Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search directories.This issue affects Spring Cloud: from 3.1.X before 3.1.13, from 4.1.X before 4.1.9, from 4.2.X before 4.2.3, from 4.3.X before 4.3.2, from 5.0.X before 5.0.2.
References
- github.com/advisories/GHSA-3qwq-q9vm-5j42
- github.com/spring-cloud/spring-cloud-config
- github.com/spring-cloud/spring-cloud-config/commit/1870f07befd5f62edcfdaea5ad82441d0fd49912
- github.com/spring-cloud/spring-cloud-config/releases/tag/v4.3.2
- github.com/spring-cloud/spring-cloud-config/releases/tag/v5.0.2
- nvd.nist.gov/vuln/detail/CVE-2026-22739
- spring.io/security/cve-2026-22739
Code Behaviors & Features
Detect and mitigate CVE-2026-22739 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →