CVE-2026-40966
MEDIUM
5,9
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
Description
AI Translation Available
In Spring AI, an attacker can bypass conversation isolation and exfiltrate sensitive memory from other users’ chat histories, including secrets and credentials, by injecting filter logic through conversationId. Only applications that use VectorStoreChatMemoryAdvisor and pass user-supplied input as a conversationId are affected.
284
Improper Access Control
IncompleteCommon Consequences
Security Scopes Affected:
Other
Potential Impacts:
Varies By Context
Applicable Platforms
Technologies:
ICS/OT, Not Technology-Specific, Web Based
Application
Spring Ai by Vmware
Version Range Affected
From
1.0.0
(inclusive)
To
1.0.6
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Spring Ai by Vmware
Version Range Affected
From
1.1.0
(inclusive)
To
1.1.5
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?version=3.1&vector=AV:N/AC…
https://spring.io/security/cve-2026-40966