Authentication Bypass Affecting spring-security-core package, versions *


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-SPRINGSECURITYCORE-12851705
  • published17 Sept 2025
  • disclosed16 Sept 2025

Introduced: 16 Sep 2025

NewCVE-2025-41248  (opens in a new tab)
CWE-289  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:8 spring-security-core.

NVD Description

Note: Versions mentioned in the description apply only to the upstream spring-security-core package and not the spring-security-core package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

The Spring Security annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue when using @PreAuthorize and other method security annotations, resulting in an authorization bypass.

Your application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature.

You are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces.

This CVE is published in conjunction with CVE-2025-41249 https://spring.io/security/cve-2025-41249 .

CVSS Base Scores

version 3.1