Description
In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected.
This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Published: 2026-03-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is a SpEL injection flaw in Spring AI’s SimpleVectorStore component, where an unescaped user-supplied value is utilized as a filter expression key. This flaw permits an attacker to insert arbitrary Spring Expression Language code that is executed by the application, giving the attacker complete code execution capabilities on the host system. The weakness is a form of expression language injection, a serious input validation failure that leads to full compromise.

Affected Systems

The affected product is Spring AI SimpleVectorStore. Versions predating 1.0.5 in the 1.0.x line and predating 1.1.4 in the 1.1.x line are impacted. Any deployment that directly uses SimpleVectorStore and passes user-controlled values as filter keys is vulnerable.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.8, indicating critical severity. EPSS indicates a probability of exploitation below 1%, and it is not listed in the Known Exploited Vulnerabilities catalog, suggesting no publicly known exploitation yet. However, the attack vector is inferred to be remote, driven by user input, meaning attackers could exploit the flaw over network or web interfaces without local access. Given the remote code execution consequence, the risk to affected systems is high and remediation is urgently recommended.

Generated by OpenCVE AI on March 27, 2026 at 21:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Spring AI to version 1.0.5 or newer, or to version 1.1.4 or newer.
  • If an upgrade is not possible, validate or escape all user-supplied filter keys before passing them to SimpleVectorStore, ensuring that only trusted expressions are evaluated.
  • Continuously monitor application logs for suspicious SpEL activity and maintain an incident response plan in case of exploitation.

Generated by OpenCVE AI on March 27, 2026 at 21:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fvh3-672c-7p6c Spring AI: SpEL injection is triggered when a user-supplied value is used as a filter expression key
References
History

Thu, 16 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Vmware
Vmware spring Ai
Weaknesses CWE-917
CPEs cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*
Vendors & Products Vmware
Vmware spring Ai

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-90

Sat, 28 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94

Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring
Vendors & Products Spring
Spring spring

Fri, 27 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Title SpEL Injection via Unescaped Filter Key in SimpleVectorStore Leads to Remote Code Execution
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-03-28T03:55:47.438Z

Reserved: 2026-01-09T06:54:49.675Z

Link: CVE-2026-22738

cve-icon Vulnrichment

Updated: 2026-03-27T19:30:40.190Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T06:16:37.663

Modified: 2026-04-16T20:15:09.010

Link: CVE-2026-22738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:30:49Z

Weaknesses