← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 40/100

Cybersecurity Briefing — Spring4Shell CVE-2022-22965 remote code execution

VMware’s Spring team disclosed CVE-2022-22965 (Spring4Shell) on 31 March 2022, a remote code execution flaw affecting Spring MVC/WebFlux apps on JDK 9+, prompting patch releases and urgent mitigation for Java web workloads.

Single-point timeline showing the publication date sized by credibility score.
Publication date and credibility emphasis for this briefing. Source data (JSON)

The Spring maintainers confirmed CVE-2022-22965 on 31 March 2022 after exploit code surfaced, enabling remote code execution on certain Spring MVC or WebFlux applications running on JDK 9 or later. The vulnerability stems from unsafe data binding in the DefaultDataBinder when deployed on Tomcat with specific conditions.

Spring issued patched versions 5.3.18 and 5.2.20 and published mitigations (e.g., setting DisallowedFields) for systems unable to update immediately. Teams were urged to inventory Java services, update to fixed releases, and verify runtime protections against RCE payloads.

Single-point timeline showing the publication date sized by credibility score.
Publication date and credibility emphasis for this briefing. Source data (JSON)

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

  • Application Security
  • Software Supply Chain
  • Incident Response
Back to curated briefings