CVE-2026-40966

Published: Apr 28, 2026 Last Modified: Apr 29, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,9
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none

Description

AI Translation Available

In Spring AI, an attacker can bypass conversation isolation and exfiltrate sensitive memory from other users’ chat histories, including secrets and credentials, by injecting filter logic through conversationId. Only applications that use VectorStoreChatMemoryAdvisor and pass user-supplied input as a conversationId are affected.

284

Improper Access Control

Incomplete
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Varies By Context
Applicable Platforms
Technologies: ICS/OT, Not Technology-Specific, Web Based
View CWE Details
Application

Spring Ai by Vmware

Version Range Affected
From 1.0.0 (inclusive)
To 1.0.6 (exclusive)
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Spring Ai by Vmware

Version Range Affected
From 1.1.0 (inclusive)
To 1.1.5 (exclusive)
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?version=3.1&vector=AV:N/AC…
https://spring.io/security/cve-2026-40966