Loading
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
Use CWE-19, Pivotal vendor hub and Spring Security Oauth product page to widen CVE-2016-4977 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-22969 for nearby disclosures in the same product family. Additional editorial context is available in Cybersecurity Weekly Roundup: April 27, 2026 — Critical Zero-Days and Framework Failures.