JustAppSec
Back to news

Patches WebFlux disk exhaustion and cache poisoning in Spring Framework

2 min readPublished 20 Apr 2026Source: CERT-FR

TL;DR — Spring MVC/WebFlux apps can be DoS’d via temp-file disk exhaustion, Windows static-resource request slowdown, or static-resource cache poisoning; inventory exposure and follow Spring’s upgrade guidance.

What happened

Spring Framework is a widely deployed Java application framework that underpins many Spring MVC and reactive Spring WebFlux web services. On April 20, 2026, CERT-FR published advisory CERTFR-2026-AVI-0457 covering three Spring Framework vulnerabilities (CVE-2026-22740, CVE-2026-22741, CVE-2026-22745), referencing Spring’s vendor bulletins dated April 17, 2026.

Based on Spring’s advisories:

  • CVE-2026-22740 (Medium): In WebFlux multipart handling, temporary files for parts larger than 10KB may not be deleted under some circumstances, enabling an attacker to consume disk space.
  • CVE-2026-22745 (Medium): In Spring MVC/WebFlux static resource resolution on Windows, an attacker can send slow-to-resolve static-resource requests that keep HTTP connections busy, leading to denial of service.
  • CVE-2026-22741 (Low): Under specific configuration conditions (resource chain caching + encoded resource resolution), an attacker can poison the static resource cache with wrong encodings and cause a client-visible breakage / DoS of the front-end.

Why this matters: availability issues in foundational frameworks tend to have high blast radius—these bugs sit on common request paths (multipart upload and static asset serving) and can turn “normal” traffic into production-impacting exhaustion.

Who is impacted

  • Services using Spring Framework in the affected lines (see version table below).
  • WebFlux applications that accept multipart requests (higher risk for CVE-2026-22740, disk exhaustion).
  • Spring MVC or WebFlux applications that serve static resources from the filesystem on Windows (risk for CVE-2026-22745).
  • Applications using Spring MVC/WebFlux with resource chain support caching enabled and encoded resources resolution (risk for CVE-2026-22741), especially when the resource cache can be poisoned from empty.
Spring Framework lineAffected versions (Spring advisory)Fixed version (Spring advisory)Notes
7.0.x7.0.07.0.67.0.7OSS
6.2.x6.2.06.2.176.2.18OSS
6.1.x6.1.06.1.266.1.27Marked Commercial by Spring
5.3.x5.3.05.3.475.3.48Marked Commercial by Spring

What to do now

  • Follow vendor remediation guidance from Spring’s advisories:

    Users of affected versions should upgrade to the corresponding fixed version.

  • Inventory where you run Spring MVC/WebFlux and identify which services terminate multipart uploads and which serve static assets from local disk.
  • For Windows deployments serving static resources, prioritize scoping and patching paths that are likely to be internet-reachable (CDN bypasses, direct origin access, internal portals reachable via VPN).
  • Until patched, increase operational visibility for potential DoS symptoms:
    • disk utilization alerts on WebFlux nodes handling multipart requests
    • connection/worker saturation metrics on services serving static resources
    • anomalous request patterns targeting static asset paths

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.