CVE-2026-40966

In Spring AI, an attacker can bypass conversation isolation and exfiltrate sensitive memory from other users’ chat histories, including secrets and credentials, by injecting filter logic through conversationId. Only applications that use VectorStoreChatMemoryAdvisor and pass user-supplied input as a conversationId are affected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*

History

29 Apr 2026, 18:18

Type Values Removed Values Added
First Time Vmware
Vmware spring Ai
CPE cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
References () https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?version=3.1&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N - () https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?version=3.1&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N - US Government Resource
References () https://spring.io/security/cve-2026-40966 - () https://spring.io/security/cve-2026-40966 - Vendor Advisory

28 Apr 2026, 08:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-28 08:16

Updated : 2026-04-29 18:18


NVD link : CVE-2026-40966

Mitre link : CVE-2026-40966

CVE.ORG link : CVE-2026-40966


JSON object : View

Products Affected

vmware

  • spring_ai
CWE
CWE-284

Improper Access Control