CVE-2026-40967

In Spring AI, various FilterExpressionConverter implementations accept a filter expression object and translate them to specific vector store query languages. In several cases, keys and values are not properly escaped, leading to the ability to alter the query. Affected versions: Spring AI: 1.0.0 - 1.0.5 (fixed in 1.0.6), 1.1.0 - 1.1.4 (fixed in 1.1.5)
References
Link Resource
https://spring.io/security/cve-2026-40967 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*

History

29 Apr 2026, 19:04

Type Values Removed Values Added
CPE cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
First Time Vmware
Vmware spring Ai
References () https://spring.io/security/cve-2026-40967 - () https://spring.io/security/cve-2026-40967 - Vendor Advisory

28 Apr 2026, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-28 07:16

Updated : 2026-04-29 19:04


NVD link : CVE-2026-40967

Mitre link : CVE-2026-40967

CVE.ORG link : CVE-2026-40967


JSON object : View

Products Affected

vmware

  • spring_ai
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')