Description
A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands.

The vulnerability exists due to missing input sanitization.
Published: 2026-03-18
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A missing input sanitization in VMware Spring AI’s MariaDBFilterExpressionConverter enables SQL injection. Attackers could inject arbitrary SQL statements to bypass metadata‑based access controls, potentially leading to unauthorized disclosure, modification, or deletion of database contents. The flaw is identified as CWE‑89, reflecting improper handling of user input in SQL queries.

Affected Systems

The vulnerability affects VMware Spring AI. No specific product version is advertised in the advisory, so all current and prior releases might be vulnerable until a vendor‑issued update resolves the issue. Administrators should verify the installed version and consult VMware’s security notices for remediation guidance.

Risk and Exploitability

The CVSS score of 8.8 indicates a high‑severity risk, while the EPSS score of less than 1% suggests a low probability of exploitation today. The vulnerability is not in CISA’s KEV catalog. Based on the description, it is inferred that attackers can exploit the flaw remotely by submitting crafted filter expressions that the converter processes, enabling arbitrary SQL execution that could compromise confidentiality, integrity, and availability.

Generated by OpenCVE AI on April 2, 2026 at 05:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any available update from VMware to address the vulnerability.
  • If no patch is available, restrict or disable access to the MariaDBFilterExpressionConverter feature.
  • Implement custom input validation to sanitize user‑supplied filter expressions before they reach the converter.
  • Monitor database logs for anomalous SQL activity and keep all other components up to date with vendor releases.

Generated by OpenCVE AI on April 2, 2026 at 05:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c267-rfvc-mvpm SQL Injection in Spring AI MariaDBFilterExpressionConverter
References
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Vmware spring Ai
CPEs cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
Vendors & Products Vmware spring Ai

Wed, 18 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89

Wed, 18 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Vmware
Vmware spring
Vendors & Products Vmware
Vmware spring

Wed, 18 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization.
Title CVE-2026-22730: SQL Injection in Spring AI MariaDBFilterExpressionConverter
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-03-19T03:55:21.545Z

Reserved: 2026-01-09T06:54:41.498Z

Link: CVE-2026-22730

cve-icon Vulnrichment

Updated: 2026-03-18T14:31:38.590Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T08:16:31.170

Modified: 2026-04-01T16:52:48.390

Link: CVE-2026-22730

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T08:00:04Z

Weaknesses