Home

Description

STOMP over WebSocket applications may be vulnerable to a security bypass that allows an attacker to send unauthorized messages. Affected Spring Products and VersionsSpring Framework: * 6.2.0 - 6.2.11 * 6.1.0 - 6.1.23 * 6.0.x - 6.0.29 * 5.3.0 - 5.3.45 * Older, unsupported versions are also affected. MitigationUsers of affected versions should upgrade to the corresponding fixed version. Affected version(s)Fix versionAvailability6.2.x6.2.12OSS6.1.x6.1.24 Commercial https://enterprise.spring.io/ 6.0.xN/A Out of support https://spring.io/projects/spring-framework#support 5.3.x5.3.46 Commercial https://enterprise.spring.io/ No further mitigation steps are necessary. CreditThis vulnerability was discovered and responsibly reported by Jannis Kaiser.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-16 | Updated 2025-10-16 | Assigner vmware




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Problem types

CWE-352: Cross-Site Request Forgery (CSRF)

Product status

Default status
affected

5.3.x
affected

6.0.x
affected

6.1.x
affected

6.2.x
affected

Timeline

2025-10-16:Initial vulnerability report published

Credits

This vulnerability was discovered and responsibly reported by Jannis Kaiser. finder

References

spring.io/security/cve/2025-41254 (Official Advisory)

nvd.nist.gov/...N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&version=3.1 (CVSS Calculator)

cve.org (CVE-2025-41254)

nvd.nist.gov (CVE-2025-41254)

Download JSON