Description
Spring AI's spring-ai-bedrock-converse contains a Server-Side Request Forgery (SSRF) vulnerability in BedrockProxyChatModel when processing multimodal messages that include user-supplied media URLs. Insufficient validation of those URLs allows an attacker to induce the server to issue HTTP requests to unintended internal or external destinations.
This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Published: 2026-03-27
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows an attacker to supply a malicious media URL in a multimodal message, causing the BedrockProxyChatModel to fetch that URL without proper validation. The resulting server‑side request can target internal or external resources, potentially exposing sensitive data or providing a pivot to internal services. The flaw does not directly grant code execution but enables unauthorized network access and data exfiltration.

Affected Systems

Spring AI’s spring‑ai‑bedrock‑converse package, versions 1.0.0 through 1.0.4 and 1.1.0 through 1.1.3, is affected. The issue remains in all releases prior to 1.0.5 and 1.1.4.

Risk and Exploitability

The CVSS score of 8.6 marks it as high severity, and the EPSS score is below 1%, indicating low current exploitation probability. The vulnerability is not listed in the KEV catalog, suggesting no publicly confirmed exploits. However, the attack vector—sending a crafted multimodal message—is straightforward for any actor with message‑sending access, making the risk significant for exposed deployments.

Generated by OpenCVE AI on March 27, 2026 at 21:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Spring AI spring‑ai‑bedrock‑converse to version 1.0.5 or later, or to 1.1.4 or later if on the 1.1.x line.
  • If an upgrade cannot be performed immediately, enforce strict validation of media URLs, whitelisting only trusted external domains and blocking internal IP ranges.
  • Enable detailed logging of outbound HTTP requests to detect any unauthorized or unexpected fetches.
  • Consider network segmentation or firewall rules that prevent the server from reaching sensitive internal resources until the vulnerability is resolved.

Generated by OpenCVE AI on March 27, 2026 at 21:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mhrg-94vw-45c5 Spring AI: Insufficient Validation causes SSRF when processing multimodal messages with user-supplied URLs
References
History

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring
Vendors & Products Spring
Spring spring

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918

Sat, 28 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918

Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918

Fri, 27 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description Spring AI's spring-ai-bedrock-converse contains a Server-Side Request Forgery (SSRF) vulnerability in BedrockProxyChatModel when processing multimodal messages that include user-supplied media URLs. Insufficient validation of those URLs allows an attacker to induce the server to issue HTTP requests to unintended internal or external destinations. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Title Server-Side Request Forgery in BedrockProxyChatModel via Unvalidated Media URL Fetching
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-03-27T19:39:20.332Z

Reserved: 2026-01-09T06:54:49.675Z

Link: CVE-2026-22742

cve-icon Vulnrichment

Updated: 2026-03-27T19:30:37.969Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-27T06:16:37.833

Modified: 2026-03-30T13:26:29.793

Link: CVE-2026-22742

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:59:52Z

Weaknesses