<reportApi _class='io.jenkins.plugins.analysis.core.restapi.ReportApi'><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>spring-security-web-5.8.16.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/webapps/govway.war/WEB-INF/lib/spring-security-web-5.8.16.jar</fileName><fingerprint>FALLBACK-db203dab</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-22732: LanguageSpecificPackageVulnerability

Spring Security: Spring Security: Security policy bypass and information disclosure due to unwritten HTTP headers

For additional help see: **Vulnerability CVE-2026-22732**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|CRITICAL|org.springframework.security:spring-security-web|6.5.9, 7.0.4|[CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)|

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.

Package: org.springframework.security:spring-security-web
Installed Version: 5.8.16
Vulnerability CVE-2026-22732
Severity: CRITICAL
Fixed Version: 6.5.9, 7.0.4
Link: [CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1395</reference><severity>HIGH</severity><toString>spring-security-web-5.8.16.jar(1,0): CVE-2026-22732: : CVE-2026-22732: LanguageSpecificPackageVulnerability

Spring Security: Spring Security: Security policy bypass and information disclosure due to unwritten HTTP headers

For additional help see: **Vulnerability CVE-2026-22732**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|CRITICAL|org.springframework.security:spring-security-web|6.5.9, 7.0.4|[CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)|

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.

Package: org.springframework.security:spring-security-web
Installed Version: 5.8.16
Vulnerability CVE-2026-22732
Severity: CRITICAL
Fixed Version: 6.5.9, 7.0.4
Link: [CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)</toString><type>CVE-2026-22732</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>spring-security-web-5.8.16.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/webapps/govwayAPIConfig.war/WEB-INF/lib/spring-security-web-5.8.16.jar</fileName><fingerprint>FALLBACK-db203dab</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-22732: LanguageSpecificPackageVulnerability

Spring Security: Spring Security: Security policy bypass and information disclosure due to unwritten HTTP headers

For additional help see: **Vulnerability CVE-2026-22732**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|CRITICAL|org.springframework.security:spring-security-web|6.5.9, 7.0.4|[CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)|

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.

Package: org.springframework.security:spring-security-web
Installed Version: 5.8.16
Vulnerability CVE-2026-22732
Severity: CRITICAL
Fixed Version: 6.5.9, 7.0.4
Link: [CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1395</reference><severity>HIGH</severity><toString>spring-security-web-5.8.16.jar(1,0): CVE-2026-22732: : CVE-2026-22732: LanguageSpecificPackageVulnerability

Spring Security: Spring Security: Security policy bypass and information disclosure due to unwritten HTTP headers

For additional help see: **Vulnerability CVE-2026-22732**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|CRITICAL|org.springframework.security:spring-security-web|6.5.9, 7.0.4|[CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)|

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.

Package: org.springframework.security:spring-security-web
Installed Version: 5.8.16
Vulnerability CVE-2026-22732
Severity: CRITICAL
Fixed Version: 6.5.9, 7.0.4
Link: [CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)</toString><type>CVE-2026-22732</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>spring-security-web-5.8.16.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/webapps/govwayAPIMonitor.war/WEB-INF/lib/spring-security-web-5.8.16.jar</fileName><fingerprint>FALLBACK-db203dab</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-22732: LanguageSpecificPackageVulnerability

Spring Security: Spring Security: Security policy bypass and information disclosure due to unwritten HTTP headers

For additional help see: **Vulnerability CVE-2026-22732**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|CRITICAL|org.springframework.security:spring-security-web|6.5.9, 7.0.4|[CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)|

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.

Package: org.springframework.security:spring-security-web
Installed Version: 5.8.16
Vulnerability CVE-2026-22732
Severity: CRITICAL
Fixed Version: 6.5.9, 7.0.4
Link: [CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1395</reference><severity>HIGH</severity><toString>spring-security-web-5.8.16.jar(1,0): CVE-2026-22732: : CVE-2026-22732: LanguageSpecificPackageVulnerability

Spring Security: Spring Security: Security policy bypass and information disclosure due to unwritten HTTP headers

For additional help see: **Vulnerability CVE-2026-22732**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|CRITICAL|org.springframework.security:spring-security-web|6.5.9, 7.0.4|[CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)|

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.

Package: org.springframework.security:spring-security-web
Installed Version: 5.8.16
Vulnerability CVE-2026-22732
Severity: CRITICAL
Fixed Version: 6.5.9, 7.0.4
Link: [CVE-2026-22732](https://avd.aquasec.com/nvd/cve-2026-22732)</toString><type>CVE-2026-22732</type></issue><size>3</size><toString>3 warnings (high: 3)</toString></reportApi>