Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
https://spring.io/blog/2022/05/11/spring-framework-5-3-20-and-5-2-22-available-now
https://security.netapp.com/advisory/ntap-20230420-0009/
https://security-tracker.debian.org/tracker/CVE-2016-1000027
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-744519525
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-582313417
https://github.com/spring-projects/spring-framework/issues/24434#issuecomment-579669626
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000027