Spring Security Flaw Bypasses Auth, Authorization
The National Vulnerability Database (NVD) has disclosed CVE-2026-22753, a high-severity vulnerability (CVSS 7.5) in Spring Security versions 7.0.0 through 7.0.4. This flaw arises when applications use securityMatchers(String) in conjunction with a PathPatternRequestMatcher.Builder bean to prepend a servlet path. The critical issue is that matching requests to the intended filter chain can fail, effectively rendering crucial security components — like authentication and authorization — inactive for those requests.
This isn’t a minor bypass; it’s a fundamental breakdown of security controls. If an attacker can craft a request that triggers this matching failure, they can potentially access protected resources without proper authentication or authorization. The NVD’s assessment highlights that confidentiality is not impacted, but integrity is severely compromised, as attackers can bypass intended security policies. There’s no user interaction required, and the attack complexity is low, making it an attractive target.
Defenders must prioritize patching. This vulnerability fundamentally undermines the security posture of affected Spring Security applications. It’s not about finding a weak password; it’s about the system failing to check passwords at all for certain paths. This is a critical architectural bypass that demands immediate attention from development and security teams.
What This Means For You
- If your organization uses Spring Security versions 7.0.0 through 7.0.4, you MUST immediately review your application configurations. Specifically, check for the use of `securityMatchers(String)` and `PathPatternRequestMatcher.Builder`. Prioritize patching to a non-vulnerable version of Spring Security to prevent complete bypass of authentication and authorization controls.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Spring Security Path Pattern Bypass - CVE-2026-22753
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-22753 | Auth Bypass | Spring Spring Security |
| CVE-2026-22753 | Auth Bypass | Spring Security versions 7.0.0 through 7.0.4 |
| CVE-2026-22753 | Auth Bypass | Usage of securityMatchers(String) and PathPatternRequestMatcher.Builder bean to prepend a servlet path |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 22, 2026 at 09:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.