CVE-2026-40975: Random value property source uses a weak PRNG unsuitable for secrets

MEDIUM | APRIL 23, 2026 | CVE-2026-40975

Description

Values produced by ${random.value} are not suitable for use as secrets. ${random.uuid} is not affected. ${random.int} and ${random.long} should never be used for secrets as they are numeric values with a predictable range.

Affected Spring Products and Versions

Spring Boot:

  • 4.0.0 - 4.0.5
  • 3.5.0 - 3.5.13
  • 3.4.0 - 3.4.15
  • 3.3.0 - 3.3.18
  • 2.7.0 - 2.7.32

Versions that are no longer supported are also affected.

Mitigation

Users of affected versions should upgrade to the corresponding fixed version.

Affected version(s) Fix version Availability
4.0.x 4.0.6 OSS
3.5.x 3.5.14 OSS
3.4.x 3.4.16 Enterprise Support Only
3.3.x 3.3.19 Enterprise Support Only
2.7.x 2.7.33 Enterprise Support Only

No further mitigation steps are necessary.

References

History

  • 2026-04-23: Initial vulnerability report published.

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all