Impact
Spring AI’s spring‑ai‑neo4j‑store contains a Cypher injection flaw in the Neo4jVectorFilterExpressionConverter. When a filter expression key supplied by a user is inserted into a backtick‑delimited Cypher property accessor after stripping only double quotes, the resulting Cypher statement can include arbitrary code, allowing an attacker to read, modify, or delete data within the Neo4j database. The weakness corresponds to CWE‑89 and leads to loss of confidentiality, integrity, and potentially availability if the attacker can disrupt the database.
Affected Systems
Affected versions are Spring AI spring‑ai‑neo4j‑store 1.0.0 through 1.0.4 and 1.1.0 through 1.1.3. Any deployment using these releases is vulnerable.
Risk and Exploitability
The vulnerability carries a CVSS base score of 7.5, indicating high severity. An exploit would require the ability to supply a filter expression key, which may be available to authenticated users of the application or possibly unauthenticated users depending on how the component is exposed. No EPSS data is available and the vulnerability is not currently listed in the CISA KEV catalog, suggesting limited public exploitation to date, but the high score and injection nature warrant serious attention.
OpenCVE Enrichment
Github GHSA