Critical Spring Cloud Gateway Vulnerabilities and How to Mitigate Them

The article outlines two Spring Cloud Gateway CVEs—CVE-2022-22947 (critical code injection) and CVE-2022-22946 (medium HTTP/2 TrustManager issue)—detailing their severity, affected versions, and recommended mitigation steps such as upgrading to 3.1.1+, disabling Actuator, or securing it with Spring Security.

Programmer DD
Programmer DD
Programmer DD
Critical Spring Cloud Gateway Vulnerabilities and How to Mitigate Them

On March 1, the official Spring blog released a report on Spring Cloud Gateway CVEs, highlighting a high‑risk and a medium‑risk vulnerability and urging users to upgrade to version 3.1.1+, 3.0.7+ or apply other mitigation measures.

CVE-2022-22947: Code Injection Vulnerability

Severity: Critical

Description: Applications using Spring Cloud Gateway are vulnerable to code injection via the Actuator endpoint when it is enabled, exposed, and unsecured, allowing attackers to execute arbitrary code on the remote host.

Affected Versions:

3.1.0

3.0.0 to 3.0.6

Other older versions

Mitigation:

3.1.x users should upgrade to 3.1.1+

3.0.x users should upgrade to 3.0.7+

If the Actuator endpoint is not needed, disable it with management.endpoint.gateway.enable:false If the Actuator endpoint is needed, protect it with Spring Security

CVE-2022-22946: HTTP2 Insecure TrustManager

Severity: Medium

Description: When HTTP/2 is enabled without configuring a keystore or trusted certificates, the application uses an insecure TrustManager, allowing the gateway to connect to remote services with invalid or custom certificates.

Affected Versions:

3.1.0

Mitigation:

3.1.x users should upgrade to 3.1.1+

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

HTTP2CVESpring Cloud GatewayCode InjectionSecurity Vulnerability
Programmer DD
Written by

Programmer DD

A tinkering programmer and author of "Spring Cloud Microservices in Action"

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.