Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3390 articles · 142067 vulns · 36/41 feeds (7d)
← Back to list
9.1
CVE-2026-40982EXPLOITEDPATCHED
spring · spring cloud config

CVE-2026-40982: Spring Cloud Config allows applications to serve arbitrary text and binary files through the spring-cloud-config-server

Description

Spring Cloud Config allows applications to serve arbitrary text and binary files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.

Affected Products

VendorProductVersions
springspring cloud configmaven/org.springframework.cloud:spring-cloud-config-server: >= 3.1.0, <= 3.1.13, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.1.0, <= 4.1.9, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.2.0, <= 4.2.6, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.3.0, <= 4.3.2, maven/org.springframework.cloud:spring-cloud-config-server: >= 5.0.0, <= 5.0.2

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
mavenorg.springframework.cloud:spring-cloud-config-serverGHSA85%
vmware tanzuspring cloudcert_advisory90%

References

  • https://spring.io/security/cve-2026-40982

Related News (5 articles)

Tier B
CERT-FR18h ago
Bulletin d'actualité CERTFR-2026-ACT-021 (11 mai 2026)
→ No new info (linked only)
Tier B
CCCS Canada4d ago
Spring security advisory (AV26-431)
→ No new info (linked only)
Tier B
BSI Advisories4d ago
[NEU] [hoch] VMware Tanzu Spring Cloud Config: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB4d ago
CVE-2026-40982 | Spring Cloud Config up to 5.0.2 URL path traversal
→ No new info (linked only)
Tier B
CERT-FR4d ago
Multiples vulnérabilités dans Spring Cloud Config (07 mai 2026)
→ No new info (linked only)
CVSS 3.19.1 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
org.springframework.cloud:spring-cloud-config-server@4.3.3org.springframework.cloud:spring-cloud-config-server@5.0.3
CWECWE-22
PublishedMay 7, 2026
Last enriched4d agov2
Trending Score76
Source articles5
Independent4
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-40981EXP
CVE-2026-40981: When using Google Secrets Manager as a backend for the Spring Cloud Config server a client can craft a request to the co
Trending: 40
HIGHCVE-2026-41002EXP
CVE-2026-41002: The base directory (`spring.cloud.config.server.git.basedir`) used by the Spring Cloud Config Server to clone Git reposi
Trending: 38
MEDIUMCVE-2026-41004
CVE-2026-41004: When enabling trace logging in Spring Cloud Config Server sensitive information was placed in plain text in the logs. Sp
Trending: 23
LOWCVE-2026-22740EXP
Spring Framework DoS with Multipart Temp Files in WebFlux
Trending: 9
MEDIUMCVE-2026-40979
CVE-2026-40979: In Spring AI, having access to a shared environment can expose the ONNX model used by the application. Affected version
Trending: 7

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 7, 2026
Discovered by ZDM
May 7, 2026
Updated: exploitAvailable, activelyExploited
May 7, 2026
Actively Exploited
May 10, 2026
Exploit Available
May 10, 2026
Patch Available
May 10, 2026

Version History

v2
Last enriched 4d ago
v2Tier B4d ago

Marked exploitAvailable and activelyExploited as true based on the new article.

exploitAvailableactivelyExploited
via CCCS Canada
v14d ago

Initial creation