Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN594
_____________________________________________________________________

DATE                : 09/09/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Spring Cloud Gateway versions
                              prior to 4.3.1, 4.2.5, 4.1.11.

=====================================================================
https://spring.io/security/cve-2025-41243
_____________________________________________________________________

CVE-2025-41243: Spring Expression Language property modification
using Spring Cloud Gateway Server WebFlux
CRITICAL | SEPTEMBER 08, 2025 | CVE-2025-41243

Description

The following versions of Spring Cloud Gateway Server Webflux may
be vulnerable to Spring Environment property modification.

An application should be considered vulnerable when all the following
are true:

    The application is using Spring Cloud Gateway Server Webflux
(Spring Cloud Gateway Server WebMVC is not vulnerable).
    Spring Boot actuator is a dependency.
    The Spring Cloud Gateway Server Webflux actuator web endpoint is
enabled via management.endpoints.web.exposure.include=gateway.
    The actuator endpoints are available to attackers.
    The actuator endpoints are unsecured.


Affected Spring Products and Versions

Spring Cloud Gateway:

    4.3.0 - 4.3.x
    4.2.0 - 4.2.x
    4.1.0 - 4.1.x
    4.0.0 - 4.0.x
    3.1.0 - 3.1.x
    Older, unsupported versions are also affected.


Mitigation

Users of affected versions should upgrade to the corresponding fixed
version.

Affected version(s)      Fix version      Availability
4.3.x                    4.3.1            OSS
4.2.x                    4.2.5            OSS
4.1.x                    4.1.11           Enterprise
4.0.x                    4.1.11           Out of support
3.1.x                    3.1.11           Enterprise

No further mitigation steps are necessary.

If you cannot upgrade, then you can:

    Remove gateway from the management.endpoints.web.exposure.include
property or secure the actuator endpoints.


Credit

This issue was responsibly reported by Ezzer17.


References

    https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&version=3.1


History

    2025-09-08: Initial vulnerability report published.

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
