Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues

Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues

Posted on September 16, 2025September 16, 2025 By CWS

Two essential vulnerabilities, CVE-2025-41248 and CVE-2025-41249, have emerged in Spring Safety and Spring Framework that would enable attackers to bypass authorization controls in enterprise functions. 

These flaws come up when utilizing Spring Safety’s @EnableMethodSecurity characteristic along with method-level annotations reminiscent of @PreAuthorize and @PostAuthorize. 

In functions the place service interfaces or summary base courses make use of unbounded generics, the annotation detection mechanism might fail to find safety annotations on overridden strategies, enabling unauthorized entry to protected endpoints. 

Key Takeaways1. Spring Safety 6.4.x/6.5.x ignores method-level annotations, enabling bypass.2. Spring Framework 5.3.x/6.1.x/6.2.x fails to detect annotations.3. Improve to fastened variations or redeclare annotations on concrete courses.

Each the authorization bypass and annotation detection flaws are categorised as Medium severity and impression a variety of Spring Safety and Spring Framework variations spanning the 5.x by means of 6.x launch trains.

Authorization Bypass Vulnerability (CVE-2025-41248)

CVE-2025-41248 targets Spring Safety variations 6.4.0 by means of 6.4.9 and 6.5.0 by means of 6.5.3. 

When a parameterized superclass defines a secured technique signature, and a subclass fails to redeclare the related annotation, the framework’s metadata resolver doesn’t traverse the generic sort hierarchy accurately. 

Attackers might exploit this logic hole by invoking secured operations outlined solely on a generic interface, bypassing authorization checks that depend on @PreAuthorize(“hasRole(‘ADMIN’)”) or comparable SpEL expressions. 

The vulnerability yields a CVSS 3.1 base rating of 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Annotation Detection Vulnerability (CVE-2025-41249)

CVE-2025-41249 impacts Spring Framework core modules in variations 5.3.0 by means of 5.3.44, 6.1.0 by means of 6.1.22, and 6.2.0 by means of 6.2.10. 

On this case, the annotation detection flaw impedes recognition of any technique annotation used for authorization or auditing when outlined on a generic base class. 

With out the annotation metadata, Spring Safety can not implement method-level safety constraints.

Each vulnerabilities stem from improper dealing with of unbounded generics throughout annotation introspection, inflicting the runtime to disregard safety metadata and deal with delicate service strategies as in the event that they had been unprotected.

CVETitleCVSS 3.1 ScoreSeverityCVE-2025-41248Spring Safety authorization bypass for technique safety annotations on parameterized types6.5MediumCVE-2025-41249Spring Framework annotation detection vulnerability on generic superclasses6.5Medium

Mitigations

Spring maintainers have launched fastened variations for all affected modules. For Spring Safety, customers ought to improve to six.4.10 or 6.5.4. 

For Spring Framework, the advisable upgrades are 5.3.45, 6.1.23, and 6.2.11. Full mitigation particulars can be found within the Spring Safety Advisories and RSS feed. 

Groups unable to improve instantly can implement a short lived workaround by declaring all secured strategies immediately within the concrete class slightly than counting on inherited annotations from generic superclasses. 

Guaranteeing constant use of @PreAuthorize, @PostAuthorize, and different technique safety annotations on every implementing class will stop the bypass.

Growth groups are urged to assessment their service interfaces for utilization of @EnableMethodSecurity along with generics. 

Static evaluation instruments and customized annotation scanning scripts needs to be up to date to detect annotated strategies accurately throughout sort hierarchies. 

Safety groups should prioritize these upgrades in CI/CD pipelines to keep away from inadvertent publicity of protected APIs. Steady validation of method-level safety, mixed with code critiques specializing in generic service patterns, will strengthen authorization enforcement and guard in opposition to comparable flaws.

Free dwell webinar on new malware ways from our analysts! Be taught superior detection strategies -> Register for Free

Cyber Security News Tags:Annotation, Authorization, Bypass, Detection, Enable, Flaws, Framework, Issues, Security, Spring

Post navigation

Previous Post: Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities
Next Post: Fraud Prevention Company SEON Raises $80 Million in Series C Funding

Related Posts

Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Cyber Security News
Critical Cisco Firewall Flaw Enables Remote Code Execution Critical Cisco Firewall Flaw Enables Remote Code Execution Cyber Security News
Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it Cyber Security News
Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Cyber Security News
GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details Cyber Security News
Threat Actors Leverage ChatGPT to Attack Mac Devices With AMOS InfoStealer Threat Actors Leverage ChatGPT to Attack Mac Devices With AMOS InfoStealer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark