{
  "threat_severity" : "Important",
  "public_date" : "2025-09-16T10:10:59Z",
  "bugzilla" : {
    "description" : "org.springframework.security/spring-security-core: Spring Security authorization bypass",
    "id" : "2395723",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2395723"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-289",
  "details" : [ "The Spring Security annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue when using @PreAuthorize and other method security annotations, resulting in an authorization bypass.\nYour application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature.\nYou are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces.\nThis CVE is published in conjunction with  CVE-2025-41249 https://spring.io/security/cve-2025-41249 .", "The Spring Security annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue when using @PreAuthorize and other method security annotations, resulting in an authorization bypass." ],
  "affected_release" : [ {
    "product_name" : "HawtIO HawtIO 4.3.0",
    "release_date" : "2025-12-04T00:00:00Z",
    "advisory" : "RHSA-2025:22765",
    "cpe" : "cpe:/a:redhat:apache_camel_hawtio:4.3::el9",
    "package" : "spring-security-core"
  }, {
    "product_name" : "Red Hat build of Apache Camel 4.10.7 for Spring Boot 3.4.10",
    "release_date" : "2025-10-14T00:00:00Z",
    "advisory" : "RHSA-2025:18028",
    "cpe" : "cpe:/a:redhat:apache_camel_spring_boot:4.10",
    "package" : "spring-security-core"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces (RHOSDS) 3.24",
    "release_date" : "2025-10-23T00:00:00Z",
    "advisory" : "RHSA-2025:19094",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3.24::el9",
    "package" : "devspaces/pluginregistry-rhel9:sha256:080273ea4bc751a33eb7451aab099b40eab46ca2b90685e661f478e45c962b71"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Data Grid 8",
    "fix_state" : "Will not fix",
    "package_name" : "spring-security-core",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:8"
  }, {
    "product_name" : "Red Hat Fuse 7",
    "fix_state" : "Will not fix",
    "package_name" : "spring-security-core",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 7",
    "fix_state" : "Not affected",
    "package_name" : "spring-security-core",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 8",
    "fix_state" : "Not affected",
    "package_name" : "spring-security-core",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform Expansion Pack",
    "fix_state" : "Not affected",
    "package_name" : "spring-security-core",
    "cpe" : "cpe:/a:redhat:jbosseapxp"
  }, {
    "product_name" : "Red Hat Process Automation 7",
    "fix_state" : "Affected",
    "package_name" : "spring-security-core",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_bpms_platform:7"
  }, {
    "product_name" : "Red Hat Single Sign-On 7",
    "fix_state" : "Will not fix",
    "package_name" : "spring-security-core",
    "cpe" : "cpe:/a:redhat:red_hat_single_sign_on:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-41248\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-41248\nhttps://github.com/spring-projects/spring-security/issues/17898\nhttps://spring.io/security/cve-2025-41248" ],
  "name" : "CVE-2025-41248",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}