Incorrect Authorization Affecting org.springframework/spring-core package, versions *


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL9-ORGSPRINGFRAMEWORKSPRINGCORE-12878927
  • published18 Sept 2025
  • disclosed16 Sept 2025

Introduced: 16 Sep 2025

NewCVE-2025-41249  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:9 org.springframework/spring-core.

NVD Description

Note: Versions mentioned in the description apply only to the upstream org.springframework/spring-core package and not the org.springframework/spring-core package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

The Spring Framework annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue if such annotations are used for authorization decisions.

Your application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature.

You are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces.

This CVE is published in conjunction with CVE-2025-41248 https://spring.io/security/cve-2025-41248 .

CVSS Base Scores

version 3.1