CVE-2026-40976
Spring · Boot
A default web security misconfiguration in Spring Boot 4.0.0–4.0.5 allows unauthenticated access to all endpoints in specific servlet-based applications.
Executive summary
A critical security misconfiguration in Spring Boot 4.0.0–4.0.5 allows unauthenticated attackers to bypass security controls and access all application endpoints.
Vulnerability
This is a security bypass vulnerability resulting from ineffective default web security. It affects servlet-based applications that lack custom Spring Security configurations and rely solely on default settings while using spring-boot-actuator-autoconfigure.
Business impact
With a CVSS score of 9.1, this vulnerability poses a severe risk of unauthorized access to sensitive application data and management endpoints. It can lead to complete exposure of backend services and potential data breaches, depending on the information exposed by the application's endpoints.
Remediation
Immediate Action: Upgrade to Spring Boot version 4.0.6 or later immediately.
Proactive Monitoring: Review application access logs for unusual requests to sensitive endpoints and audit existing security configurations.
Compensating Controls: Implement custom Spring Security filters to explicitly secure all endpoints until the application can be updated.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Upgrade to the patched version of Spring Boot as soon as possible. Organizations should also review their application security posture to ensure that proper authentication and authorization controls are in place for all endpoints.