Security for everyone

CVE-2022-22947 Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in Spring Cloud Gateway affects v. Spring cloud gateway 3.1.x prior to 3.1.1+, 3.0.x prior to 3.0.7+ and all old and unsupported versions.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2022-22947 Scanner Detail

Spring Cloud Gateway is a popular open-source solution for routing and providing security to microservices APIs. It is widely used by developers to build cloud-native applications that require flexibility, scalability, and security. The Spring Cloud Gateway is responsible for handling all inbound and outbound traffic to and from the microservices. It provides a number of features including routing, filtering, load balancing, and service discovery.

Recently, a severe vulnerability has been detected in the Spring Cloud Gateway, known as CVE-2022-22947. This vulnerability is a code injection attack that exploits an unsecured and exposed Gateway Actuator endpoint, allowing the attacker to execute arbitrary code on the remote host. This vulnerability can easily be exploited by hackers remotely making a maliciously crafted request that can lead to disastrous consequences.

If the CVE-2022-22947 vulnerability is successfully exploited, it can lead to a range of severe consequences, such as arbitrary code execution, data leakage, and device takeover. This can cause irreversible damage for businesses and individuals, resulting in sensitive data being compromised and sensitive financial information being stolen. 
In addition, the damage can go further, infringing not only the company and its customers, but also its reputation and credibility. is a pro security platform capable of detecting and preventing vulnerabilities. The services offered can help mitigate the risk of vulnerabilities in digital assets. It can also provide protection for clients when using open-source software, which is often more susceptible to vulnerabilities due to the nature of the code. By using, businesses and individuals can quickly identify and address any vulnerabilities present in their systems and protect their data and assets with peace of mind.




cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture