CVE-2026-40982
Spring Cloud · Config Server
Spring Cloud Config allows directory traversal via specially crafted URLs, enabling unauthorized access to arbitrary files.
Executive summary
A directory traversal vulnerability in Spring Cloud Config allows attackers to access arbitrary files on the system, potentially exposing sensitive configuration data.
Vulnerability
The application does not properly sanitize input in the configuration server module, allowing an attacker to use directory traversal sequences (../) to access files outside of the intended directory.
Business impact
This vulnerability can expose critical application secrets, environment configurations, and other sensitive system files. Given the 9.1 CVSS score, the potential for information disclosure is severe and could lead to further exploitation of the entire infrastructure.
Remediation
Immediate Action: Upgrade to the specific patched versions provided by Spring Cloud (e.g., 3.1.14, 4.1.10, 4.2.7, 4.3.3, or 5.0.3).
Proactive Monitoring: Review access logs for URL requests containing directory traversal patterns and monitor for unauthorized access to sensitive configuration files.
Compensating Controls: Use a Web Application Firewall (WAF) to block requests containing directory traversal sequences and ensure the application runs with the minimum file system permissions required.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Security teams should immediately identify all affected Spring Cloud Config instances and apply the necessary version updates. Given the sensitivity of configuration servers, this must be treated as a high-priority task.