CVE-2026-22746: User Attribute Enumeration when Using DaoAuthenticationProvider

LOW | APRIL 20, 2026 | CVE-2026-22746

Description

If an application is using the UserDetails#isEnabled, #isAccountNonExpired, or #isAccountNonLocked user attributes, to enable, expire, or lock users, then DaoAuthenticationProvider's timing attack defense can be bypassed for users who are disabled, expired, or locked.

Affected Spring Products and Versions

Spring Security:

  • 5.7.0 - 5.7.22
  • 5.8.0 - 5.8.24
  • 6.3.0 - 6.3.15
  • 6.4.0 - 6.4.15
  • 6.5.0 - 6.5.9
  • 7.0.0 - 7.0.4
  • Older, unsupported versions are also affected.

Mitigation

Users of affected versions should upgrade to the corresponding fixed version.

Affected version(s) Fix version Availability
5.7.x 5.7.23 Enterprise Support Only
5.8.x 5.8.25 Enterprise Support Only
6.3.x 6.3.16 Enterprise Support Only
6.4.x 6.4.16 Enterprise Support Only
6.5.x 6.5.10 OSS
7.0.x 7.0.5 OSS

Note that this version also introduces a setter DaoAuthenticationProvider#setAlwaysPerformAdditionalChecksOnUser. In the event that this upgrade causes you trouble, you can set this value to false.

Credit

The issue was identified and responsibly reported by meverden.

References

History

  • 2026-04-20: Initial vulnerability report published.

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all