Spring Data Commons, versions 1.13 to 1.13.10 and 2.0 to 2.0.5, , contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data’s projection-based request payload binding hat can lead to a remote code execution attack. External References: https://pivotal.io/security/cve-2018-1273 Upstream Issue: https://jira.spring.io/browse/DATACMNS-1282 Upstream Patches: https://github.com/spring-projects/spring-data-commons/commit/b1a20ae1e82a63f99b3afc6f2aaedb3bf4dc432a https://github.com/spring-projects/spring-data-commons/commit/ae1dd2741ce06d44a0966ecbd6f47beabde2b653