Spring Security Flaw Bypasses Auth, Authorization

Spring Security Flaw Bypasses Auth, Authorization

The National Vulnerability Database (NVD) has disclosed CVE-2026-22753, a high-severity vulnerability (CVSS 7.5) in Spring Security versions 7.0.0 through 7.0.4. This flaw arises when applications use securityMatchers(String) in conjunction with a PathPatternRequestMatcher.Builder bean to prepend a servlet path. The critical issue is that matching requests to the intended filter chain can fail, effectively rendering crucial security components — like authentication and authorization — inactive for those requests.

This isn’t a minor bypass; it’s a fundamental breakdown of security controls. If an attacker can craft a request that triggers this matching failure, they can potentially access protected resources without proper authentication or authorization. The NVD’s assessment highlights that confidentiality is not impacted, but integrity is severely compromised, as attackers can bypass intended security policies. There’s no user interaction required, and the attack complexity is low, making it an attractive target.

Defenders must prioritize patching. This vulnerability fundamentally undermines the security posture of affected Spring Security applications. It’s not about finding a weak password; it’s about the system failing to check passwords at all for certain paths. This is a critical architectural bypass that demands immediate attention from development and security teams.

What This Means For You

  • If your organization uses Spring Security versions 7.0.0 through 7.0.4, you MUST immediately review your application configurations. Specifically, check for the use of `securityMatchers(String)` and `PathPatternRequestMatcher.Builder`. Prioritize patching to a non-vulnerable version of Spring Security to prevent complete bypass of authentication and authorization controls.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Spring Security Path Pattern Bypass - CVE-2026-22753

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-22753 Auth Bypass Spring Spring Security
CVE-2026-22753 Auth Bypass Spring Security versions 7.0.0 through 7.0.4
CVE-2026-22753 Auth Bypass Usage of securityMatchers(String) and PathPatternRequestMatcher.Builder bean to prepend a servlet path
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 22, 2026 at 09:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6840 — Missing bounds validation for operator could allow out of

CVE-2026-6840 — Missing bounds validation for operator could allow out of range operator-code lookup during model loading Affected version is prior to commit 1.30.0.

vulnerabilityCVEmedium-severitycwe-129
/SCW Vulnerability Desk /MEDIUM /5.5 /⚑ 2 IOCs /⚙ 1 Sigma

CVE-2026-6839 — Improper validation of STRING tensor offsets could allows

CVE-2026-6839 — Improper validation of STRING tensor offsets could allows malformed string metadata to trigger out of bounds access during constant tensor import in Samsung...

vulnerabilityCVEmedium-severitycwe-1284
/SCW Vulnerability Desk /MEDIUM /6.6 /⚑ 2 IOCs /⚙ 1 Sigma

CVE-2026-41667 — Integer Overflow

CVE-2026-41667 — Integer overflow in constant tensor data size calculation in Samsung Open Source ONE could cause incorrect buffer sizing for large constant nodes. Affected...

vulnerabilityCVEmedium-severityinteger-overflowcwe-190
/SCW Vulnerability Desk /MEDIUM /6.6 /⚑ 2 IOCs /⚙ 1 Sigma