CVE-2026-40982: Directory Traversal with spring-cloud-config-server

CRITICAL | MAY 06, 2026 | CVE-2026-40982

Description

Spring Cloud Config allows applications to server arbitrary text and binary files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.

Affected Spring Products and Versions

Spring Cloud Config:

  • 3.1.x
  • 4.1.x
  • 4.2.x
  • 4.3.x
  • 5.0.x
  • Older, unsupported versions are also affected

Mitigation

Users of affected versions should upgrade to the corresponding fixed version.

Affected version(s) Fix version Availability
3.1.x 3.1.14 Enterprise Support Only
4.1.x 4.1.10 Enterprise Support Only
4.2.x 4.2.7 Enterprise Support Only
4.3.x 4.3.3 OSS
5.0.x 5.0.3 OSS

Credit

The issue was identified and responsibly reported by Swapnil Paliwal and the security team at AxiomCode using the AxiomEngine, August829, and rash18mi.

References

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all