← Back to CVEs
CVE-2023-20873
CRITICAL9.8
Description
In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/20/2023
Last Modified5/5/2025
Sourcenvd
Honeypot Sightings0
Affected Products
vmware:spring_boot
References
https://security.netapp.com/advisory/ntap-20230601-0009/(security@vmware.com)
https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now(security@vmware.com)
https://spring.io/security/cve-2023-20873(security@vmware.com)
https://security.netapp.com/advisory/ntap-20230601-0009/(af854a3a-2127-422b-91ae-364da2661108)
https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now(af854a3a-2127-422b-91ae-364da2661108)
https://spring.io/security/cve-2023-20873(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.