Spring Boot CVE-2026-40975

MEDIUM
Use of Insufficiently Random Values (CWE-330)
2026-04-28 [email protected]
4.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

1
Analysis Generated
Apr 28, 2026 - 00:32 vuln.today

DescriptionNVD

Values produced by ${random.value} are not suitable for use as secrets. ${random.uuid} is not affected. ${random.int} and ${random.long} should never be used for secrets as they are numeric values with a predictable range.

Affected: Spring Boot 4.0.0-4.0.5 (fix 4.0.6), 3.5.0-3.5.13 (fix 3.5.14), 3.4.0-3.4.15 (fix 3.4.16), 3.3.0-3.3.18 (fix 3.3.19), 2.7.0-2.7.32 (fix 2.7.33); random value property source / weak PRNG for secrets. Versions that are no longer supported are also affected per vendor advisory.

AnalysisAI

Spring Boot applications using ${random.value} for secrets generation produce cryptographically weak values unsuitable for authentication, encryption keys, or other sensitive purposes. Affected versions 2.7.0 through 4.0.5 generate predictable random values when relying on the random value property source; attackers can enumerate or predict these values to compromise confidentiality and integrity of secrets. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Share

CVE-2026-40975 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy