In Spring AI, various FilterExpressionConverter implementations accept a filter expression object and translate them to specific vector store query languages. In several cases, keys and values are not properly escaped, leading to the ability to alter the query.
Affected versions:
Spring AI: 1.0.0 - 1.0.5 (fixed in 1.0.6), 1.1.0 - 1.1.4 (fixed in 1.1.5)
References
| Link | Resource |
|---|---|
| https://spring.io/security/cve-2026-40967 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Apr 2026, 19:04
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:* | |
| First Time |
Vmware
Vmware spring Ai |
|
| References | () https://spring.io/security/cve-2026-40967 - Vendor Advisory |
28 Apr 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-28 07:16
Updated : 2026-04-29 19:04
NVD link : CVE-2026-40967
Mitre link : CVE-2026-40967
CVE.ORG link : CVE-2026-40967
JSON object : View
Products Affected
vmware
- spring_ai
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
