Spring Security Advisories

CVE-2021-22060: Additional Log Injection in Spring Framework (follow-up to CVE-2021-22096)

MEDIUM | JANUARY 05, 2022 | CVE-2021-22060


In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.

Affected Spring Products and Versions

  • Spring Framework
    • 5.3.0 to 5.3.13
    • 5.2.0 to 5.2.18
    • Older, unsupported versions are also affected


Users of affected versions should apply the following mitigation. 5.3.x users should upgrade to 5.3.14+. 5.2.x users should upgrade to 5.2.19+. No other steps are necessary. Releases that have fixed this issue include:

  • Spring Framework
    • 5.3.14+
    • 5.2.19+


This vulnerability was responsibly reported by psytester.


  • 2022-01-05: Initial vulnerability report published.

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Spring Runtime offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all