Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x2wq-9x2f-fhj7 | Spring Security Core has a TOCTOU race condition when One-Time Token login with JdbcOneTimeTokenService is configured |
Fri, 01 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring Security |
|
| CPEs | cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vmware
Vmware spring Security |
Sat, 25 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spring
Spring spring Security |
|
| Vendors & Products |
Spring
Spring spring Security |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerability in Spring Spring Security. Applications that explicitly configure One-Time Token login with JdbcOneTimeTokenService are vulnerable to a Time-of-check Time-of-use (TOCTOU) race condition. This issue affects Spring Security: from 6.4.0 through 6.4.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4. | |
| Title | Spring Security JdbcOneTimeTokenService allows a one-time token to authenticate multiple sessions | |
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-04-21T18:44:34.841Z
Reserved: 2026-01-09T06:55:03.990Z
Link: CVE-2026-22751
Updated: 2026-04-21T18:44:13.539Z
Status : Analyzed
Published: 2026-04-21T19:16:16.550
Modified: 2026-05-01T12:11:12.903
Link: CVE-2026-22751
OpenCVE Enrichment
Updated: 2026-04-22T11:45:51Z
Github GHSA