When an application is configured to use `ApplicationPidFileWriter`, a local attacker with write access to the PID file's location can corrupt one file on the host each time the application is started. Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); PID file / symlink behavior (`ApplicationPidFileWriter`). Versions that are no longer supported are also affected per vendor advisory.
History

Thu, 30 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Vmware
Vmware spring Boot
CPEs cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*
Vendors & Products Vmware
Vmware spring Boot

Thu, 30 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Local File Corruption via Spring Boot PID File Writer Misconfiguration Spring Boot: Spring Boot: Local file corruption via PID file manipulation
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 28 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
Title Local File Corruption via Spring Boot PID File Writer Misconfiguration

Tue, 28 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring Boot
Vendors & Products Spring
Spring spring Boot

Mon, 27 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description When an application is configured to use `ApplicationPidFileWriter`, a local attacker with write access to the PID file's location can corrupt one file on the host each time the application is started. Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); PID file / symlink behavior (`ApplicationPidFileWriter`). Versions that are no longer supported are also affected per vendor advisory.
Weaknesses CWE-59
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published: 2026-04-27T23:36:06.654Z

Updated: 2026-04-28T14:34:36.220Z

Reserved: 2026-04-16T02:19:04.616Z

Link: CVE-2026-40977

cve-icon Vulnrichment

Updated: 2026-04-28T13:55:15.321Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-28T00:16:24.947

Modified: 2026-04-30T13:37:07.597

Link: CVE-2026-40977

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-27T23:36:06Z

Links: CVE-2026-40977 - Bugzilla