Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Affecting springframework:spring-web package, versions [0,]


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-SPRINGFRAMEWORK-15701758
  • published20 Mar 2026
  • disclosed19 Mar 2026
  • creditGyu-hyeok Lee (g2h)

Introduced: 19 Mar 2026

NewCVE-2026-22735  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection'). The vulnerability exists in the handling of Server-Sent Events (SSE) when streaming plain text data. An attacker can inject crafted data into the event stream, breaking message boundaries and corrupting the stream delivered to other clients. By controlling streamed content, an attacker can manipulate how subsequent events are parsed by the client, potentially altering application state or injecting misleading data.

Note:

This is only exploitable if the application streams attacker-controlled data via SSE using unstructured/plain-text messages instead of a structured format (e.g., JSON).

CVSS Base Scores

version 4.0
version 3.1