CVE-2026-2817

Creation of Temporary File in Directory with Insecure Permissions
Affects
Spring Data Geode
in
Spring
No items found.
Versions
>= 2.0.0 < 2.7.18, >= 1.7.0 <= 2.2.13
Exclamation circle icon
Patch Available

This Vulnerability has been fixed in the Never-Ending Support (NES) version offered by HeroDevs.

Overview

Spring Data Geode and Spring Data GemFire provide Spring-based configuration and programming model support for Apache Geode and Pivotal GemFire, respectively.

An insecure temporary directory usage vulnerability (CVE-2026-2817) has been identified in Spring Data Geode/Gemfire, where archive-based snapshots are expanded to a predictable, world-readable location in the system temporary directory.

This issue affects multiple versions of Spring Data Geode.

Details

Module Info

Vulnerability Info

This medium-severity vulnerability affects the snapshot import feature of the spring-data-geode package.

When a ZIP or JAR archive is provided for snapshot import, the library extracts its contents to a temporary directory using a predictable name derived from the archive filename with default system permissions (typically world-readable). No cleanup of extracted files is performed after import. This enables a local user to enumerate predictable temp directory names and read sensitive Geode/GemFire cache data exported by another user on the same system.

Mitigation

Spring Data Geode and Spring Data GemFire have reached end-of-life and are no longer community-supported. Affected users should leverage a commercial support partner like HeroDevs for post-EOL security support through NES for Spring.

Users of the affected components should apply one of the following mitigations:

  • Set the Java temp directory -Djava.io.tmpdir to a user-private directory.
  • Also best practice to clean up temporary snapshot directories immediately after imports.
  • Leverage a commercial support partner like HeroDevs for post-EOL security support.

Credits

  • Jonathan Leitschuh (@JLLeitschuh)

Vulnerability Details
ID
CVE-2026-2817
PROJECT Affected
Spring Data Geode
Versions Affected
>= 2.0.0 < 2.7.18, >= 1.7.0 <= 2.2.13
NES Versions Affected
Published date
February 19, 2026
≈ Fix date
February 19, 2026
Severity
Level
CVSS Assessment
Low
>=0 <4
Medium
>=4 <6
High
>=6 <8
Critical
>=8 <10
Medium
Category
Creation of Temporary File in Directory with Insecure Permissions
Sign up for the latest vulnerability alerts fixed in
NES for Spring
Rss feed icon
Subscribe via RSS
or

By clicking “submit” I acknowledge receipt of our Privacy Policy.

Thanks for signing up for our Newsletter! We look forward to connecting with you.
Oops! Something went wrong while submitting the form.