Description
In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected.
This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Published: 2026-03-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

In Spring AI's SimpleVectorStore a SpEL injection flaw allows attackers the ability to supply an unescaped filter expression key. The unsanitized input is evaluated as a Spring Expression Language expression, which can trigger execution of arbitrary code within the JVM. A successful exploit grants the attacker full control over the host, compromising confidentiality, integrity and availability of the entire application.

Affected Systems

Spring AI releases prior to 1.0.5 in the 1.0.x line and prior to 1.1.4 in the 1.1.x line are affected. Any deployment that uses SimpleVectorStore and passes user‑supplied values as filter keys is vulnerable.

Risk and Exploitability

The CVSS base score is 9.8, indicating critical severity. EPSS data is not available and the vulnerability is not yet listed in KEV, yet the high score and remote code execution capability suggest an elevated risk of active exploitation. The attack vector is remote, as the attacker only needs to provide a malicious filter key through any interface that forwards it to SimpleVectorStore.

Generated by OpenCVE AI on March 27, 2026 at 06:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Spring AI to version 1.0.5 or later in the 1.0.x line, or to 1.1.4 or later in the 1.1.x line.
  • If an immediate upgrade is not possible, sanitize or reject any user‑supplied filter keys before they reach SimpleVectorStore, ensuring they contain no SpEL syntax.
  • Limit the exposure of interfaces that accept filter keys to trusted users or IP ranges.
  • Continuously monitor the application for abnormal SpEL expression activity or related error logs.

Generated by OpenCVE AI on March 27, 2026 at 06:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring
Vendors & Products Spring
Spring spring

Fri, 27 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Title SpEL Injection via Unescaped Filter Key in SimpleVectorStore Leads to Remote Code Execution
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-03-27T05:21:07.168Z

Reserved: 2026-01-09T06:54:49.675Z

Link: CVE-2026-22738

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T06:16:37.663

Modified: 2026-03-27T06:16:37.663

Link: CVE-2026-22738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:16Z

Weaknesses