PT-2026-31891 · Vmware · Spring Cloud Gateway
Published
2026-04-10
·
Updated
2026-04-10
·
CVE-2026-22750
CVSS v3.1
7.5
High
| AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
SSL bundle configuration silently bypassed in Spring Cloud Gateway
CVE: CVE-2026-22750
PT ID: PT-2026-31891
PT-Identifier: PT-2026-31891
Vendor: Vmware
Product: Spring Cloud Gateway
CVSS: 7.5
Credits: n/a
Description:
When configuring SSL bundles in Spring Cloud Gateway by using the configuration property spring.ssl.bundle, the configuration was silently ignored and the default SSL configuration was used instead.
Note: The 4.2.x branch is no longer under open source support. If you are using Spring Cloud Gateway 4.2.0 and are not an enterprise customer, you can upgrade to any Spring Cloud Gateway 4.2.x release newer than 4.2.0 available on Maven Centeral https://t.co/LPXTEhZmo2 . Ideally if you are not an enterprise customer, you should be upgrading to 5.0.2 or 5.1.1 which are the current supported open source releases.
References:
• https://t.co/Wwzthx0Jo2
• https://t.co/85pcwIys3g
#dbugs vuln
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Spring Cloud Gateway