{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22753","assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","state":"PUBLISHED","assignerShortName":"vmware","dateReserved":"2026-01-09T06:55:03.991Z","datePublished":"2026-04-22T05:20:31.083Z","dateUpdated":"2026-04-22T15:59:59.319Z"},"containers":{"cna":{"providerMetadata":{"orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware","dateUpdated":"2026-04-22T05:20:31.083Z"},"title":"Servlet Path Not Correctly Included in Path Matching of HttpSecurity#securityMatchers","affected":[{"vendor":"Spring","product":"Spring Security","versions":[{"status":"affected","version":"7.0.0","lessThanOrEqual":"7.0.4","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Vulnerability in Spring Spring Security. If an application is using securityMatchers(String) and a PathPatternRequestMatcher.Builder bean to prepend a servlet path, matching requests to that filter chain may fail and its related security components will not be exercised as intended by the application. This can lead to the authentication, authorization, and other security controls being rendered inactive on intended requests.This issue affects Spring Security: from 7.0.0 through 7.0.4.","supportingMedia":[{"type":"text/html","base64":false,"value":"Vulnerability in Spring Spring Security. If an application is using&nbsp;<code>securityMatchers(String)</code>&nbsp;and a&nbsp;<code>PathPatternRequestMatcher.Builder</code>&nbsp;bean to prepend a servlet path, matching requests to that filter chain may fail and its related security components will not be exercised as intended by the application. This can lead to the authentication, authorization, and other security controls being rendered inactive on intended requests.<p>This issue affects Spring Security: from 7.0.0 through 7.0.4.</p>"}]}],"references":[{"url":"https://spring.io/security/cve-2026-22753"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseSeverity":"HIGH","baseScore":7.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-693","lang":"en","description":"CWE-693 Protection Mechanism Failure"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-22T15:43:49.628549Z","id":"CVE-2026-22753","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-22T15:59:59.319Z"}}]}}