Critical
CVSS 9.8 Admin Panel Exposure Responsible Disclosure
Disclosure
[vendor] Admin API — Spring Boot Actuator Deep-Dive + Origin Bypass Chain
Target: admin-api.[vendor]:7443 ([vendor]-PRO-ADMIN-SERVICE) Base URL: https://admin-api.[vendor]:7443/AdminApi/actuator Stack: Spring Boot 3.x, Tomcat 10.1.4, Java 17.0.11+7-LTS-207, Oracle DB, Redis 7.0.15, SMTP2GO
- Target
- Global Crypto Exchange
- Category
- Admin Panel Exposure
- Channel
- Responsible Disclosure
- Disclosed
- 2026-04
Redaction note
Vendor identity withheld.
This finding is documented here as part of MemCyber’s public disclosure record. The vendor has been anonymized to a sector and region descriptor. Full technical detail — including root cause, reproducible proof-of-concept, remediation guidance, and vendor attribution where granted — is available to qualified prospects under NDA.
Coordinated disclosure
How we handled it.
- Reported to the vendor via Responsible Disclosure with a reproducible proof-of-concept.
- Triage + remediation window coordinated with the vendor security team.
- Fix verified before any public reference.
- This record published only after the embargo period closed.