CVE-2026-40973
Description
A local attacker on the same host as the application may be able to take control of the directory used by `ApplicationTemp`. When `server.servlet.session.persistent` is set to `true` and the attack persists across application restarts, this may allow the attacker to read session information and hijack authenticated users or deploy a gadget chain and execute code as the application's user.
Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); predictable temp directory / `ApplicationTemp` ownership verification. Versions that are no longer supported are also affected per vendor advisory.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
Single Data Point
Only one EPSS measurement is available for this CVE. Trend analysis requires multiple data points over time.
Insecure Temporary File
IncompleteCommon Consequences
Applicable Platforms
Spring Boot by Vmware
cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*
Spring Boot by Vmware
cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*
Spring Boot by Vmware
cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*
Spring Boot by Vmware
cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*
Spring Boot by Vmware
cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*