CVE-2026-40981: Spring Cloud Config Exposes GCP Secrets
A critical vulnerability, CVE-2026-40981, has been identified in Spring Cloud Config when used with Google Secrets Manager. According to the National Vulnerability Database, a malicious client can craft specific requests to the config server, potentially exposing sensitive secrets from unintended Google Cloud Platform (GCP) projects. This isn’t just a misconfiguration risk; it’s a bypass that directly undermines the segregation of secrets.
The National Vulnerability Database assigns this a CVSS score of 7.5 (High), with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. This means an unauthenticated attacker can remotely exploit this with low complexity, leading to a complete compromise of confidentiality. The flaw, categorized under CWE-639 (Authorization Bypass Through User-Controlled Key), is a glaring security hole for organizations relying on Spring Cloud Config for centralized secret management.
Immediate patching is non-negotiable. Affected versions span Spring Cloud Config 3.1.x (up to 3.1.13), 4.1.x (up to 4.1.9), 4.2.x (up to 4.2.6), 4.3.x (up to 4.3.2), and 5.0.x (up to 5.0.2). Organizations must upgrade to 3.1.14+, 4.1.10+, 4.2.7+, 4.3.3+, or 5.0.3+ respectively. For enterprise support customers, ensure you’re on the latest patched versions.
What This Means For You
- If your organization uses Spring Cloud Config with Google Secrets Manager, assume compromise until proven otherwise. Immediately identify all instances running affected versions. Prioritize patching to the recommended secure versions. Post-patch, audit GCP project access logs for any unauthorized secret retrieval attempts, especially from projects that should not be accessible to the config server.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Spring Cloud Config GCP Secrets Exposure - Free Tier
title: Spring Cloud Config GCP Secrets Exposure - Free Tier
id: scw-2026-05-07-ai-1
status: experimental
level: high
description: |
Detects potential exploitation of CVE-2026-40981 by looking for GET requests to Spring Cloud Config endpoints that include '/config/v1/projects/' and '/secrets/', indicating an attempt to access GCP secrets from unintended projects.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-40981/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/config/v1/projects/'
cs-method:
- 'GET'
sc-status:
- 200
selection_exploit_path:
cs-uri|contains:
- '/secrets/'
condition: selection AND selection_exploit_path
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40981 | Information Disclosure | Spring Cloud Config 3.1.0 through 3.1.13 |
| CVE-2026-40981 | Information Disclosure | Spring Cloud Config 4.1.0 through 4.1.9 |
| CVE-2026-40981 | Information Disclosure | Spring Cloud Config 4.2.0 through 4.2.6 |
| CVE-2026-40981 | Information Disclosure | Spring Cloud Config 4.3.0 through 4.3.2 |
| CVE-2026-40981 | Information Disclosure | Spring Cloud Config 5.0.0 through 5.0.2 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 07, 2026 at 07:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.