CVE-2026-22746
ADVISORY - githubSummary
Vulnerability in Spring Spring Security. If an application is using the UserDetails#isEnabled, #isAccountNonExpired, or #isAccountNonLocked user attributes, to enable, expire, or lock users, then DaoAuthenticationProvider's timing attack defense can be bypassed for users who are disabled, expired, or locked. This issue affects Spring Security: from 5.7.0 through 5.7.22, from 5.8.0 through 5.8.24, from 6.3.0 through 6.3.15, from 6.5.0 through 6.5.9, from 7.0.0 through 7.0.4.
Common Weakness Enumeration (CWE)
Observable Timing Discrepancy
Observable Timing Discrepancy
NIST
2.2
CVSS SCORE
3.7lowGitHub
2.2
CVSS SCORE
3.7lowUbuntu
-
CVSS SCORE
N/AmediumChainguard
CGA-qmvm-mr2p-7qf9
-
minimos
MINI-2mp3-8cc9-6f6j
-
minimos
MINI-3h39-8gmw-m53v
-
minimos
MINI-64pw-gjh2-q8g5
-
minimos
MINI-7mcf-926p-hvx7
-
minimos
MINI-7p6v-j7w7-829w
-
minimos
MINI-9xh5-38jf-44x8
-
minimos
MINI-f2c9-x62v-384q
-
minimos
MINI-f7rr-7gw2-wrxh
-
minimos
MINI-jw8h-g94q-rmxf
-
minimos
MINI-wvm2-6xg2-pvr9
-
minimos
MINI-xffh-48qc-hcpx
-