Check the status of CVEs. Learn More.
Compliance + Protection: Strengthen your cybersecurity defenses with TuxCare’s Security Hardening – or gain painless FIPS 140-3 compliance with Extended Security Updates.
Note: in 5.8.16.tuxcare version we apply our patch for CVE-2025-22228 to the latest available open source community version as a baseline.
This CVE has been resolved by the TuxCare team and
a patch has been delivered to ELS for Spring users.
Spring Security is a powerful authentication and access control framework for Java applications, particularly those built using the Spring Framework. It provides a comprehensive security solution, addressing various concerns such as authentication, authorization, and protection against common security vulnerabilities.
Protection Mechanism Failure takes place when the product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
The fix applied in CVE-2025-22228 inadvertently broke the timing attack mitigation implemented in DaoAuthenticationProvider
This issue affects multiple versions of org.springframework.security:spring-security-crypto package.
org.springframework.security:spring-security-core package
Vulnerability Dossier | |
---|---|
CVE ID | CVE-2025-22234 |
Severity | MEDIUM: 5.3 |
CWE-ID and name | CWE-693: Protection Mechanism Failure |
Affected project | Spring Security |
Affected packages | spring-security-crypto spring-security-core |
Affected versions | 5.7.16 only 5.8.16.tuxcare only 5.8.16.tuxcare.1 only 5.8.16.tuxcare.2 only 5.8.18 only 6.0.16 only 6.1.14 only 6.2.10 only 6.3.8 only 6.4.4 only |
NVD publish date | awaiting |
TuxCare fixed version | 5.8.16.tuxcare.3 |
Vulnerability Info
This flaw stems from an error introduced in the BCryptPasswordEncoder as a consequence of a patch for CVE-2025-22228. This change inadvertently disrupted the timing attack mitigation previously present in DaoAuthenticationProvider. As a result, a remote attacker can identify by type of exception or different time response whether this username is present or not. This is known as user enumeration — the attacker can build a list of valid usernames.
Once attacker has real usernames, can:
Spring Security 5.8.x is no longer supported by open source community as its End of Life date is 2023-12-31. It simply means that version from that date does not receive any updates to address this issue.
Users of the affected components should apply one of the following mitigations:
Do you need a fix for this vulnerability for any other Spring Security version, please contact us, we are here to help you!