In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input.
Specifically, an application is vulnerable when all the following are true:
org.springframework.http.ContentDisposition
.ContentDisposition.Builder#filename(String, Charset)
.An application is not vulnerable if any of the following is true:
org.springframework.http.ContentDisposition
.ContentDisposition.Builder#filename(String)
, orContentDisposition.Builder#filename(String, ASCII)
Users of affected versions should upgrade to the corresponding fixed version.
| Affected version(s) | Fix version | Availability | | - | - | - | | 6.2.x | 6.2.8 | OSS | | 6.1.x | 6.1.21 | OSS | | 6.0.x | 6.0.29 | Commercial |
No further mitigation steps are necessary.
{ "nvd_published_at": "2025-06-12T22:15:21Z", "cwe_ids": [ "CWE-113" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-06-13T22:12:57Z" }