Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.springframework.cloud/spring-cloud-gateway-server-webflux
  4. ›
  5. CVE-2025-41243

CVE-2025-41243: Spring Expression language property modification using Spring Cloud Gateway Server WebFlux

September 16, 2025

Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification.

An application should be considered vulnerable when all the following are true:

  • The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable).
  • Spring Boot actuator is a dependency.
  • The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway.
  • The actuator endpoints are available to attackers.
  • The actuator endpoints are unsecured.

References

  • github.com/advisories/GHSA-q2cj-h8fw-q4cc
  • nvd.nist.gov/vuln/detail/CVE-2025-41243
  • spring.io/security/cve-2025-41243

Code Behaviors & Features

Detect and mitigate CVE-2025-41243 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.1.0 up to 3.1.10, all versions starting from 4.0.0 up to 4.1.10, all versions starting from 4.2.0 before 4.2.5, all versions starting from 4.3.0 before 4.3.1

Fixed versions

  • 4.2.5
  • 4.3.1

Solution

Upgrade to versions 4.2.5, 4.3.1 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

maven/org.springframework.cloud/spring-cloud-gateway-server-webflux/CVE-2025-41243.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 17 Sep 2025 00:19:46 +0000.