Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3qwq-q9vm-5j42 | Spring Cloud Config Server: Path Traversal via Profile Parameter Allows Arbitrary File Access |
| Link | Providers |
|---|---|
| https://spring.io/security/cve-2026-22739 |
|
Tue, 24 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spring
Spring spring |
|
| Vendors & Products |
Spring
Spring spring |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search directories.This issue affects Spring Cloud: from 3.1.X before 3.1.13, from 4.1.X before 4.1.9, from 4.2.X before 4.2.3, from 4.3.X before 4.3.2, from 5.0.X before 5.0.2. | |
| Title | Spring Cloud Config Profile Substitution Can Allow Unintended Access To Files And Enable SSRF Attacks | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-03-24T14:40:53.515Z
Reserved: 2026-01-09T06:54:49.675Z
Link: CVE-2026-22739
Updated: 2026-03-24T14:39:35.975Z
Status : Awaiting Analysis
Published: 2026-03-24T01:17:00.910
Modified: 2026-03-24T15:53:48.067
Link: CVE-2026-22739
No data.
OpenCVE Enrichment
Updated: 2026-04-21T23:45:02Z
Github GHSA