In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

Project Subscriptions

Vendors Products
Banking Branch Subscribe
Banking Cash Management Subscribe
Banking Corporate Lending Process Management Subscribe
Banking Credit Facilities Process Management Subscribe
Banking Electronic Data Exchange For Corporates Subscribe
Banking Liquidity Management Subscribe
Banking Origination Subscribe
Banking Supply Chain Finance Subscribe
Banking Trade Finance Process Management Subscribe
Banking Virtual Account Management Subscribe
Communications Cloud Native Core Automated Test Suite Subscribe
Communications Cloud Native Core Console Subscribe
Communications Cloud Native Core Network Exposure Function Subscribe
Communications Cloud Native Core Network Function Cloud Native Environment Subscribe
Communications Cloud Native Core Network Repository Function Subscribe
Communications Cloud Native Core Network Slice Selection Function Subscribe
Communications Cloud Native Core Policy Subscribe
Communications Cloud Native Core Security Edge Protection Proxy Subscribe
Communications Cloud Native Core Unified Data Repository Subscribe
Communications Communications Policy Management Subscribe
Financial Services Analytical Applications Infrastructure Subscribe
Financial Services Behavior Detection Platform Subscribe
Financial Services Enterprise Case Management Subscribe
Mysql Enterprise Monitor Subscribe
Product Lifecycle Analytics Subscribe
Retail Xstore Point Of Service Subscribe
Sd-wan Edge Subscribe
Serverless Subscribe
Spring Cloud Function Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6v73-fgf6-w5j7 Spring Cloud Function Code Injection with a specially crafted SpEL as a routing expression
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Wed, 29 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-08-25'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 01:00:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2025-10-21T23:15:42.941Z

Reserved: 2022-01-10T00:00:00.000Z

Link: CVE-2022-22963

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:42.845Z

cve-icon NVD

Status : Analyzed

Published: 2022-04-01T23:15:13.663

Modified: 2025-10-30T19:56:53.730

Link: CVE-2022-22963

cve-icon Redhat

Severity : Critical

Publid Date: 2022-03-29T00:00:00Z

Links: CVE-2022-22963 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses