In Spring AI, an attacker can bypass conversation isolation and exfiltrate sensitive memory from other users’ chat histories, including secrets and credentials, by injecting filter logic through conversationId. Only applications that use VectorStoreChatMemoryAdvisor and pass user-supplied input as a conversationId are affected.
References
| Link | Resource |
|---|---|
| https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?version=3.1&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N | US Government Resource |
| https://spring.io/security/cve-2026-40966 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Apr 2026, 18:18
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Vmware
Vmware spring Ai |
|
| CPE | cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:* | |
| References | () https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?version=3.1&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N - US Government Resource | |
| References | () https://spring.io/security/cve-2026-40966 - Vendor Advisory |
28 Apr 2026, 08:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-28 08:16
Updated : 2026-04-29 18:18
NVD link : CVE-2026-40966
Mitre link : CVE-2026-40966
CVE.ORG link : CVE-2026-40966
JSON object : View
Products Affected
vmware
- spring_ai
CWE
CWE-284
Improper Access Control
