CVE-2026-40967
HIGH
8,6
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: low
Availability: low
Description
AI Translation Available
In Spring AI, various FilterExpressionConverter implementations accept a filter expression object and translate them to specific vector store query languages. In several cases, keys and values are not properly escaped, leading to the ability to alter the query.
Affected versions:
Spring AI: 1.0.0 - 1.0.5 (fixed in 1.0.6), 1.1.0 - 1.1.4 (fixed in 1.1.5)
94
Improper Control of Generation of Code ('Code Injection')
DraftCommon Consequences
Security Scopes Affected:
Access Control
Integrity
Confidentiality
Availability
Non-Repudiation
Potential Impacts:
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Execute Unauthorized Code Or Commands
Hide Activities
Applicable Platforms
Languages:
Interpreted
Technologies:
AI/ML
Application
Spring Ai by Vmware
Version Range Affected
From
1.0.0
(inclusive)
To
1.0.6
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Spring Ai by Vmware
Version Range Affected
From
1.1.0
(inclusive)
To
1.1.5
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://spring.io/security/cve-2026-40967