A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands.
The vulnerability exists due to missing input sanitization.
The vulnerability exists due to missing input sanitization.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://spring.io/security/cve-2026-22730 |
|
History
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring |
|
| Vendors & Products |
Vmware
Vmware spring |
Wed, 18 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization. | |
| Title | CVE-2026-22730: SQL Injection in Spring AI MariaDBFilterExpressionConverter | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-03-18T07:36:30.533Z
Reserved: 2026-01-09T06:54:41.498Z
Link: CVE-2026-22730
No data.
Status : Received
Published: 2026-03-18T08:16:31.170
Modified: 2026-03-18T08:16:31.170
Link: CVE-2026-22730
No data.
OpenCVE Enrichment
Updated: 2026-03-18T10:41:41Z
Weaknesses
No weakness.