CVE-2026-22738
SpEL Injection via Unescaped Filter Key in SimpleVectorStore Leads to Remote Code Execution
CVSS Score
9.8
EPSS Score
0.1%
EPSS Percentile
22th
In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
| Vendor | spring |
| Product | spring ai |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Mar 27, 2026 |
| Last Updated | Mar 28, 2026 |
Stay Ahead of the Next One
Get instant alerts for spring spring ai
Be the first to know when new critical vulnerabilities affecting spring spring ai are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Spring / Spring AI
1.0.0 < 1.0.5 1.1.0 < 1.1.4