Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3376 articles · 142290 vulns · 36/41 feeds (7d)
← Back to list
4.4
CVE-2026-41004PATCHED
spring · spring cloud config

CVE-2026-41004: When enabling trace logging in Spring Cloud Config Server sensitive information was placed in plain text in the logs. Sp

Description

When enabling trace logging in Spring Cloud Config Server sensitive information was placed in plain text in the logs. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.

Affected Products

VendorProductVersions
springspring cloud configmaven/org.springframework.cloud:spring-cloud-config-server: >= 3.1.0, <= 3.1.13, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.1.0, <= 4.1.9, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.2.0, <= 4.2.6, maven/org.springframework.cloud:spring-cloud-config-server: >= 4.3.0, <= 4.3.2, maven/org.springframework.cloud:spring-cloud-config-server: >= 5.0.0, <= 5.0.2

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
mavenorg.springframework.cloud:spring-cloud-config-serverGHSA85%
vmware tanzuspring cloudcert_advisory90%

References

  • https://spring.io/security/cve-2026-41004

Related News (3 articles)

Tier B
BSI Advisories4d ago
[NEU] [hoch] VMware Tanzu Spring Cloud Config: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB4d ago
CVE-2026-41004 | Spring Cloud Config up to 5.0.2 log file
→ No new info (linked only)
Tier B
CERT-FR4d ago
Multiples vulnérabilités dans Spring Cloud Config (07 mai 2026)
→ No new info (linked only)
CVSS 3.14.4 MEDIUM
VectorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch available
org.springframework.cloud:spring-cloud-config-server@4.3.3org.springframework.cloud:spring-cloud-config-server@5.0.3
CWECWE-532
PublishedMay 7, 2026
Trending Score22
Source articles3
Independent3
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-40982EXP
CVE-2026-40982: Spring Cloud Config allows applications to serve arbitrary text and binary files through the spring-cloud-config-server
Trending: 75
HIGHCVE-2026-40981EXP
CVE-2026-40981: When using Google Secrets Manager as a backend for the Spring Cloud Config server a client can craft a request to the co
Trending: 40
HIGHCVE-2026-41002EXP
CVE-2026-41002: The base directory (`spring.cloud.config.server.git.basedir`) used by the Spring Cloud Config Server to clone Git reposi
Trending: 37
LOWCVE-2026-22740EXP
Spring Framework DoS with Multipart Temp Files in WebFlux
Trending: 9
MEDIUMCVE-2026-40979
CVE-2026-40979: In Spring AI, having access to a shared environment can expose the ONNX model used by the application. Affected version
Trending: 7

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 7, 2026
Discovered by ZDM
May 7, 2026
Patch Available
May 7, 2026