VMware Tanzu Spring Security: Attackers can log in malicious clients

Due to security issues, authentication is bypassable in the context of VMware Tanzu Spring Security, among other things.

listen Print view
A symbolic update button.

(Image: Photon photo/Shutterstock.com)

2 min. read

Attackers can exploit a total of seven vulnerabilities in VMware Tanzu Spring Security and, in the worst case, execute their code. Security updates are now available. Even though the software manufacturer has not yet indicated any attacks, administrators should install the patches promptly.

Tanzu Spring Security is an authentication and access control framework designed to make handling Spring-based applications as secure as possible. However, it is now becoming a security risk itself.

According to a warning, one of the most dangerous is a “critical” vulnerability (CVE-2026-22752) in the context of dynamic client registration. Because metadata fields are not sufficiently checked during the registration of a new client, attackers can place an exploit there. However, they must already have a valid initial access token. If an attack is successful, attackers can register a client under their control and execute malicious code, among other things, as part of stored XSS attacks.

Two further vulnerabilities are classified as “high” threat level (CVE-2026-22754, CVE-2026-22753). Because attackers can send requests to paths that should actually be protected, security mechanisms can be bypassed.

The developers assure that the security issues have been resolved in Tanzu Spring Security version 7.0.5 and Spring Authorization Server 1.3.11, 1.4.10, and 1.5.7.

Videos by heise

Admins can find further details on the software vulnerabilities and threatened and secured versions in the security section of the VMware Tanzu website.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.