{"id":"CVE-2021-22118","details":"In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.","aliases":["GHSA-gfwj-fwqj-fp3v"],"modified":"2026-04-10T04:29:58.134292Z","published":"2021-05-27T15:15:07.437Z","references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210713-0005/"},{"type":"ADVISORY","url":"https://tanzu.vmware.com/security/cve-2021-22118"},{"type":"FIX","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/spring-projects/spring-framework","events":[{"introduced":"927b8c15ef20eaaa4002d4b2170cc536a6d6aa35"},{"fixed":"5d46ae91f02313ce755eb3e1c9164ee6b1468da8"},{"introduced":"5acffaa72da10ba42fe547eeea44d8615cbf99b9"},{"fixed":"b1280ffeaaa3d666606fbe92f34219303fa5bbd7"}],"database_specific":{"versions":[{"introduced":"5.2.0"},{"fixed":"5.2.15"},{"introduced":"5.3.0"},{"fixed":"5.3.7"}]}}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"11.3.2"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"1.9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.14.0"}]},{"events":[{"introduced":"8.0.0"},{"last_affected":"8.1.0"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.3"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3.6"}]},{"events":[{"introduced":"8.0.0"},{"last_affected":"8.2.4.0"}]},{"events":[{"introduced":"8.0.0"},{"last_affected":"8.2.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5.0"}]},{"events":[{"introduced":"12.6.0"},{"last_affected":"12.6.4"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]},{"events":[{"introduced":"8.0.8"},{"last_affected":"8.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1.0"}]},{"events":[{"introduced":"11.0"},{"last_affected":"11.3.1"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2.7"}]},{"events":[{"introduced":"0"},{"last_affected":"11.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.3.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.25"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0"}]},{"events":[{"introduced":"16.0"},{"last_affected":"19.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1.3.2"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0.3.1"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1.3.2"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0.3.1"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"19.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1.3"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.0.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.0.2.2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.0.3.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-22118.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}