Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

cve-2025-22235
CVE

CVE-2025-22235

Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed

Description

EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed.

Your application may be affected by this if all the following conditions are met:

  •  You use Spring Security
  •  EndpointRequest.to() has been used in a Spring Security chain configuration
  •  The endpoint which EndpointRequest references is disabled or not exposed via web
  •  Your application handles requests to /null and this path needs protection

You are not affected if any of the following is true:

  •  You don't use Spring Security
  •  You don't use EndpointRequest.to()
  •  The endpoint which EndpointRequest.to() refers to is enabled and is exposed
  •  Your application does not handle requests to /null or this path does not need protection

Base CVSS

7.3

EPSS Score

0.08%

Introduced Version

2.0.0.RELEASE

Fix Available

3.3.11,3.4.5

Available Patches

Package
CVEs Fixed
Lines of Code Changed

AppSec for the Software Development Revolution

Endor Labs builds a complete graph of your software estate, so teams can pinpoint and fix critical risks in complex, dependency-rich code—whether it was written by humans or AI.