Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-40981
PUBLISHED
More InfoOfficial Page
Assigner-vmware
Assigner Org ID-dcf2e128-44bd-42ed-91e8-88f912c1401d
View Known Exploited Vulnerability (KEV) details
Published At-07 May, 2026 | 03:55
Updated At-07 May, 2026 | 03:55
Rejected At-
▼CVE Numbering Authority (CNA)

When using Google Secrets Manager as a backend for the Spring Cloud Config server a client can craft a request to the config server potentially exposing secrets from unintended GCP projects. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.

Affected Products
Vendor
VMware (Broadcom Inc.)Spring
Product
Spring Cloud Config
Default Status
unaffected
Versions
Affected
  • From 3.1.0 before 3.1.14 (custom)
  • From 4.1.0 before 4.1.10 (custom)
  • From 4.2.0 before 4.2.7 (custom)
  • From 4.3.0 before 4.3.3 (custom)
  • From 5.0.0 before 5.0.3 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-639CWE-639: Authorization Bypass Through User-Controlled Key
Type: CWE
CWE ID: CWE-639
Description: CWE-639: Authorization Bypass Through User-Controlled Key
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
N/AAn unauthenticated remote attacker can craft a request to the Config Server to expose sensitive secrets from unintended GCP projects, compromising the confidentiality of data managed by the server.
CAPEC ID: N/A
Description: An unauthenticated remote attacker can craft a request to the Config Server to expose sensitive secrets from unintended GCP projects, compromising the confidentiality of data managed by the server.
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://spring.io/security/cve-2026-40981
N/A
Hyperlink: https://spring.io/security/cve-2026-40981
Resource: N/A
Details not found