Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN618
_____________________________________________________________________

DATE                : 17/09/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Spring Security versions prior to
                                   6.4.10, 6.5.4.

=====================================================================
https://spring.io/security/cve-2025-41248/
_____________________________________________________________________

CVE-2025-41248: Spring Security authorization bypass for method
security annotations on parameterized types
MEDIUM | SEPTEMBER 15, 2025 | CVE-2025-41248


Description

The Spring Security annotation detection mechanism may not correctly
resolve annotations on methods within type hierarchies with a
parameterized super type with unbounded generics. This can be an issue
when using @PreAuthorize and other method security annotations,
resulting in an authorization bypass.

Your application may be affected by this if you are using Spring
Security's @EnableMethodSecurity feature.

You are not affected by this if you are not using @EnableMethodSecurity
or if you do not use security annotations on methods in generic
superclasses or generic interfaces.

This CVE is published in conjunction with CVE-2025-41249.


Affected Spring Products and Versions

Spring Security:

    6.4.0 - 6.4.9
    6.5.0 - 6.5.3


Mitigation

Users of affected versions should follow the mitigation steps in
CVE-2025-41249 as well as upgrade to the corresponding fixed
version:

Affected version(s) 	Fix version 	Availability

6.4.x                   6.4.10          OSS
6.5.x                   6.5.4           OSS

No other mitigation steps are necessary.

If you cannot upgrade, then you can ensure all secured target
methods are declared in their target class.


Credit

This vulnerability was discovered and responsibly reported
independently by an anonymous individual.


References

    https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:X/RL:O/RC:C/CR:L/IR:X/AR:X/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:L/MI:N/MA:N&version=3.1


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
