Spring has identified a critical vulnerability in Spring Cloud Gateway Server WebFlux that enables attackers to alter Spring Environment properties under certain configurations. This issue, tracked as CVE-2025-41243, has been assigned the highest severity score of CVSS 10.0. According to the advisory, the weakness stems from “Spring Expression Language property modification using Spring Cloud Gateway Server WebFlux” and arises when actuator endpoints are left exposed without proper security protections. An application is deemed vulnerable if it meets all the following conditions: it uses Spring Cloud Gateway Server WebFlux and includes Spring Boot actuator as a dependency. The actuator web endpoint is explicitly activated using the setting management.endpoints.web.exposure.include=gateway. Actuator endpoints are both accessible and unsecured. When these conditions align, attackers can tamper with sensitive Spring Environment properties, potentially altering application behavior. As Spring Cloud Gateway is widely adopted in microservices as a reactive API gateway, often deployed at the edge of enterprise networks, this flaw poses a significant risk. Actuator endpoints, typically used for monitoring and operational insights, can unintentionally allow attackers direct access to runtime configurations if they are not properly secured. A security flaw impacts both supported and unsupported versions of Spring Cloud Gateway, and Pivotal strongly encourages all affected users to upgrade to the patched versions (3.1.x to 3.1.11 Enterprise, 4.1.x to 4.1.11 Enterprise, 4.2.x to 4.2.5 OSS, 4.3.x to 4.3.1 OSS). For users unable to upgrade immediately, the mitigations are recommended for Secure actuator endpoints with proper authentication and access controls.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...