{"id":"CVE-2024-38808","summary":"CVE-2024-38808: Spring Expression DoS Vulnerability","details":"In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition.\n\nSpecifically, an application is vulnerable when the following is true:\n\n  *  The application evaluates user-supplied SpEL expressions.","aliases":["GHSA-9cmq-m9j5-mvww"],"modified":"2026-05-18T05:57:15.127601348Z","published":"2024-08-20T07:12:44.736Z","related":["CGA-qcfg-2fjr-q59h"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38808.json","cna_assigner":"vmware","unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"introduced":"5.3.0"},{"fixed":"5.3.39, 6.0+"}]}]},"references":[{"type":"WEB","url":"https://spring.io/security/cve-2024-38808"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38808.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38808"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240920-0002/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/spring-projects/spring-framework","events":[{"introduced":"5acffaa72da10ba42fe547eeea44d8615cbf99b9"},{"fixed":"f1b128b88d734670b4e1842e9ecf41f5252c778d"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"5.3.0"},{"fixed":"5.3.39"}],"cpe":"cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38808.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}]}