CVE-2022-22965: Spring4Shell

Score: 9.8
CRITICAL
Published: 2022-03-31Affected: Spring Framework 5.3.x < 5.3.18 / 5.2.x < 5.2.20CWE-94 β†—

What is Spring4Shell?

Remote code execution via data binding in Spring MVC and Spring WebFlux when running on JDK 9+. Attackers can modify the ClassLoader through crafted HTTP parameters to achieve arbitrary file writes and shell execution.

Impact & Exploitation

Affected the most popular Java web framework. Exploits were available within 24 hours of disclosure. Government agencies issued emergency directives for patching.

Precogs Logo

Precogs Research

This vulnerability intelligence report was analyzed and enriched by the Precogs AI Security Team. Our researchers continuously monitor emerging threats across AI code, LLM pipelines, and binary architectures to ensure accurate real-time remediation guidance.

Is Your System Still Exposed to Critical CVEs?

Vulnerabilities like CVE-2022-22965 Spring4Shell don’t just exist in source code β€” they persist in compiled binaries, containers, and embedded systems. Precogs AI detects vulnerable components across your entire stack β€” even when source code isn’t available.