Description
Spring Cloud Config allows applications to serve arbitrary text and binary files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.
INFO
Published Date :
2026-05-07T03:49:30.065Z
Last Modified :
2026-05-07T12:55:59.204Z
Source :
vmware
AFFECTED PRODUCTS
The following products are affected by CVE-2026-40982 vulnerability.
| Vendors | Products |
|---|---|
| Spring |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40982.
| URL | Resource |
|---|---|
| https://spring.io/security/cve-2026-40982 |
|