In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of its own and rely on the default web security filter chain; depend on spring-boot-actuator-autoconfigure; not depend on spring-boot-health. If any of the above does not apply, the application is not vulnerable.
Affected: Spring Boot 4.0.0–4.0.5; upgrade to 4.0.6 or later per vendor advisory.
References
| Link | Resource |
|---|---|
| https://spring.io/security/cve-2026-40976 | Vendor Advisory |
Configurations
History
30 Apr 2026, 13:54
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:* | |
| First Time |
Vmware
Vmware spring Boot |
|
| References | () https://spring.io/security/cve-2026-40976 - Vendor Advisory |
28 Apr 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-28 00:16
Updated : 2026-04-30 13:54
NVD link : CVE-2026-40976
Mitre link : CVE-2026-40976
CVE.ORG link : CVE-2026-40976
JSON object : View
Products Affected
vmware
- spring_boot
CWE
CWE-862
Missing Authorization
