CVE DATABASE / CVE-2020-5410
CVE-2020-5410
VMware Tanzu Spring Cloud Config Directory Traversal Vulnerability
Confirmed exploited in the wild. Added 2022-03-25.
Federal remediation due 2022-04-15.
Required action: Apply updates per vendor instructions.
Summary
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
CVSS 3.1 breakdown
| Base score | 7.5 (HIGH) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | NONE |
| Availability | NONE |
Weakness type (CWE)
Affected products
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- https://tanzu.vmware.com/security/cve-2020-5410
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-5410
Data: NIST NVD + CISA KEV. NVD last modified 2025-11-03. Always verify against the vendor advisory before acting.