Cyber Posture

CVE-2025-41243

CriticalRCE

Published: 16 September 2025

Published
16 September 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0726 91.7th percentile
Risk Priority 24 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-41243 is a critical-severity Code Injection (CWE-94) vulnerability in Spring Cloud Gateway (inferred from references). Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 8.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-7 (Least Functionality).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations on unsecured actuator endpoints, directly preventing unauthorized remote access for Spring Environment property modification.

prevent

Restricts system to least functionality by disabling unnecessary gateway actuator endpoints, eliminating the vulnerable configuration property exposure.

prevent

Monitors and controls network access to internal actuator endpoints, blocking availability to external attackers required for exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct remote exploitation of an exposed public-facing Spring actuator endpoint enabling code injection and arbitrary code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Spring Cloud Gateway Server Webflux may be vulnerable to Spring Environment property modification. An application should be considered vulnerable when all the following are true: * The application is using Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC…

more

is not vulnerable). * Spring Boot actuator is a dependency. * The Spring Cloud Gateway Server Webflux actuator web endpoint is enabled via management.endpoints.web.exposure.include=gateway. * The actuator endpoints are available to attackers. * The actuator endpoints are unsecured.

Deeper analysisAI

CVE-2025-41243 is a critical vulnerability in Spring Cloud Gateway Server Webflux that allows Spring Environment property modification. Applications are vulnerable only if they meet all of the following conditions: they use Spring Cloud Gateway Server Webflux (Spring Cloud Gateway Server WebMVC is not affected); Spring Boot actuator is included as a dependency; the gateway actuator web endpoint is explicitly enabled via the configuration property management.endpoints.web.exposure.include=gateway; the actuator endpoints are exposed and accessible to attackers; and the actuator endpoints lack security controls. The vulnerability is associated with CWE-94 (Improper Control of Generation of Code ('Code Injection')) and CWE-917 (Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')), and it has a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating maximum severity with network accessibility, low attack complexity, no privileges or user interaction required, and high impact across confidentiality, integrity, and availability with changed scope.

Remote attackers can exploit this vulnerability by accessing the unsecured gateway actuator endpoint over the network. Exploitation enables modification of Spring Environment properties, potentially leading to arbitrary code execution, data exfiltration, system compromise, or denial of service, as reflected in the CVSS impact metrics.

The official Spring security advisory at https://spring.io/security/cve-2025-41243 provides further details on affected versions and recommended mitigations.

Details

CWE(s)

Affected Products

Spring
Cloud Gateway
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-23209Shared CWE-94
CVE-2026-39440Shared CWE-94
CVE-2026-3300Shared CWE-94
CVE-2025-6389Shared CWE-94
CVE-2025-8723Shared CWE-94
CVE-2025-34277Shared CWE-94
CVE-2025-57141Shared CWE-94
CVE-2024-48818Shared CWE-94
CVE-2025-10679Shared CWE-94
CVE-2025-9321Shared CWE-94

References