Skip to content

Conversation

@bwappsec
Copy link

snyk-top-banner

Snyk has created this PR to fix 3 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • samples/server/petstore/java-pkmst/pom.xml

Merge Risk: High

This release includes two major, high-risk upgrades that require significant developer action before merging.

  • org.springframework.boot:spring-boot-starter-web (1.5.6.RELEASE → 3.4.11): This is a massive upgrade across two major versions (1.x → 2.x → 3.x). Key breaking changes include a required upgrade to Java 17 and the migration from Java EE to Jakarta EE, which renames packages from javax.* to jakarta.* across the entire codebase. Numerous configuration properties and core dependencies like Spring Security have also changed significantly.
  • net.logstash.logback:logstash-logback-encoder (4.11 → 9.0): This upgrade also spans multiple major versions. Version 8.0 and newer require Java 11. Given the Spring Boot upgrade requires Java 17, this is compatible, but configuration and class name changes are highly likely across this many versions.

Recommendation: These upgrades are substantial and will require a dedicated migration effort. It is strongly advised to handle this in a separate, focused effort and not as part of routine dependency updates. Developers should follow the official Spring Boot 2.x to 3.x migration guides.

Notice 🤖: This content was generated using artificial intelligence. AI-generated content may contain errors and should be reviewed for accuracy before use.
Was this summary helpful 👍? Not helpful 👎?


Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
high severity Relative Path Traversal
SNYK-JAVA-ORGAPACHETOMCATEMBED-13733966
  166   Major version upgrade No Path Found No Known Exploit
medium severity Improper Resource Shutdown or Release
SNYK-JAVA-ORGAPACHETOMCATEMBED-13723930
  102   Major version upgrade No Path Found No Known Exploit
medium severity External Initialization of Trusted Variables or Data Stores
SNYK-JAVA-CHQOSLOGBACK-13169722
  61   net.logstash.logback:logstash-logback-encoder:
4.11 -> 9.0
Major version upgrade No Path Found No Known Exploit

Vulnerabilities that could not be fixed

  • Upgrade:
    • Could not upgrade org.springframework.boot:[email protected] to org.springframework.boot:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/1.5.6.RELEASE/spring-boot-dependencies-1.5.6.RELEASE.pom

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Relative Path Traversal

@bwappsec bwappsec changed the title [Snyk] Fix for 3 vulnerabilities SWI-3723 [Snyk] Fix for 3 vulnerabilities Oct 30, 2025
@bwappsec
Copy link
Author

bwappsec commented Oct 30, 2025

Snyk checks have passed. No issues have been found so far.

Status Scanner Critical High Medium Low Total (0)
Licenses 0 0 0 0 0 issues
Code Security 0 0 0 0 0 issues
Open Source Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants