CVE-2025-41253

Published Oct 16, 2025

Last updated a month ago

CVSS high 7.5
Webflux
Spring

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-41253 affects Spring Cloud Gateway Server Webflux applications. It involves the potential exposure of environment variables and system properties through the use of Spring Expression Language (SpEL) in application routes. The vulnerability arises when an admin or an untrusted third party uses SpEL to access these variables and properties via routes. Specifically, the vulnerability can be triggered if the Spring Cloud Gateway Server Webflux actuator web endpoint is enabled and accessible without authentication. An attacker could then create or modify routes via the actuator endpoint, injecting SpEL expressions to access sensitive beans like `@systemProperties` and `@systemEnvironment`. This could allow the attacker to read sensitive information, including authentication tokens, API keys, and database credentials, from the application's runtime environment.

Description
The following versions of Spring Cloud Gateway Server Webflux may be vulnerable to the ability to expose environment variables and system properties to attackers. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not vulnerable). * An admin or untrusted third party using Spring Expression Language (SpEL) to access environment variables or system properties via routes. * An untrusted third party could create a route that uses SpEL to access environment variables or system properties if: * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway and management.endpoint.gateway.enabled=trueor management.endpoint.gateway.access=unrestricte. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.
Source
security@vmware.com
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity
HIGH

Weaknesses

security@vmware.com
CWE-917

Social media

Hype score
Not currently trending