Relative Path Traversal The advisory has been revoked - it doesn't affect any version of package org.springframework:spring-core  (opens in a new tab)


Threat Intelligence

EPSS
0.04% (10th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Relative Path Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGSPRINGFRAMEWORK-11958848
  • published18 Aug 2025
  • disclosed14 Aug 2025
  • credit1ue, iSafeBlue, Joakim Erdfelt

Introduced: 14 Aug 2025

NewCVE-2025-41242  (opens in a new tab)
CWE-23  (opens in a new tab)

How to fix?

Upgrade org.springframework:spring-core to version 6.2.10 or higher.

Amendment

This was deemed not a vulnerability.

Overview

org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities.

Affected versions of this package are vulnerable to Relative Path Traversal when deployed on non-compliant Servlet containers. An unauthenticated attacker could gain access to files and directories outside the intended web root.

Notes:

  1. This is only exploitable if the application is deployed as a WAR or with an embedded Servlet container, the Servlet container does not reject suspicious sequences and the application serves static resources with Spring resource handling.

  2. Applications deployed on Apache Tomcat or Eclipse Jetty are not vulnerable, as long as default security features are not disabled in the configuration.

  3. This vulnerability was also fixed in the commercial versions 6.1.22 and 5.3.44.

This advisory was revoked, as the specific affected library is org.springframework:spring-beans. The advisory is available at SNYK-JAVA-ORGSPRINGFRAMEWORK-12008931.