{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22740","assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","state":"PUBLISHED","assignerShortName":"vmware","dateReserved":"2026-01-09T06:54:49.675Z","datePublished":"2026-04-29T10:46:15.633Z","dateUpdated":"2026-04-29T14:00:50.573Z"},"containers":{"cna":{"providerMetadata":{"orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware","dateUpdated":"2026-04-29T14:00:50.573Z"},"title":"Spring Framework DoS with Multipart Temp Files in WebFlux","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-400","description":"CWE-400 Uncontrolled Resource Consumption","type":"CWE"}]}],"affected":[{"vendor":"VMware","product":"Spring Framework","versions":[{"status":"affected","version":"7.0.0","lessThan":"7.0.7","versionType":"semver"},{"status":"affected","version":"6.2.0","lessThan":"6.2.18","versionType":"semver"},{"status":"affected","version":"6.1.0","lessThan":"6.1.27","versionType":"semver"},{"status":"affected","version":"5.3.0","lessThan":"5.3.48","versionType":"semver"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space.\n\nOlder, unsupported versions are also affected.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space.</p><p>Older, unsupported versions are also affected.</p>"}]}],"references":[{"url":"https://spring.io/security/cve-2026-22740"},{"url":"https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseSeverity":"MEDIUM","baseScore":6.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-29T11:55:51.268118Z","id":"CVE-2026-22740","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-29T11:58:39.725Z"}}]}}