Description
Spring AI's spring-ai-neo4j-store contains a Cypher injection vulnerability in Neo4jVectorFilterExpressionConverter. When a user-controlled string is passed as a filter expression key in Neo4jVectorFilterExpressionConverter of spring-ai-neo4j-store, doKey() embeds the key into a backtick-delimited Cypher property accessor (node.`metadata.`) after stripping only double quotes, without escaping embedded backticks.This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Published: 2026-03-27
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Database code execution via Cypher injection
Action: Immediate Patch
AI Analysis

Impact

Spring AI’s spring‑ai‑neo4j‑store contains a Cypher injection flaw in the Neo4jVectorFilterExpressionConverter. When a filter expression key supplied by a user is inserted into a backtick‑delimited Cypher property accessor after stripping only double quotes, the resulting Cypher statement can include arbitrary code, allowing an attacker to read, modify, or delete data within the Neo4j database. The weakness corresponds to CWE‑89 and leads to loss of confidentiality, integrity, and potentially availability if the attacker can disrupt the database.

Affected Systems

Affected versions are Spring AI spring‑ai‑neo4j‑store 1.0.0 through 1.0.4 and 1.1.0 through 1.1.3. Any deployment using these releases is vulnerable.

Risk and Exploitability

The vulnerability carries a CVSS base score of 7.5, indicating high severity. An exploit would require the ability to supply a filter expression key, which may be available to authenticated users of the application or possibly unauthenticated users depending on how the component is exposed. No EPSS data is available and the vulnerability is not currently listed in the CISA KEV catalog, suggesting limited public exploitation to date, but the high score and injection nature warrant serious attention.

Generated by OpenCVE AI on March 27, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade spring-ai-neo4j-store to version 1.0.5 or later, or 1.1.4 or later.
  • If an upgrade is not immediately possible, restrict the characters allowed in filter expression keys by rejecting backticks and other special characters.
  • Implement input validation or a whitelist of acceptable keys to prevent arbitrary Cypher construction.
  • Monitor application logs for unexpected Cypher queries or error messages that may indicate an injection attempt.

Generated by OpenCVE AI on March 27, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7cj7-rcw6-p68v Spring AI has a Cypher Injection vulnerability in Neo4jVectorFilterExpressionConverter
References
History

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring
Vendors & Products Spring
Spring spring

Sat, 28 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89

Fri, 27 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description Spring AI's spring-ai-neo4j-store contains a Cypher injection vulnerability in Neo4jVectorFilterExpressionConverter. When a user-controlled string is passed as a filter expression key in Neo4jVectorFilterExpressionConverter of spring-ai-neo4j-store, doKey() embeds the key into a backtick-delimited Cypher property accessor (node.`metadata.`) after stripping only double quotes, without escaping embedded backticks.This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Title Server-Side Request Forgery via Filter Expression Keys in Neo4jVectorStore
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-03-27T19:38:58.544Z

Reserved: 2026-01-09T06:54:49.675Z

Link: CVE-2026-22743

cve-icon Vulnrichment

Updated: 2026-03-27T19:38:54.694Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-27T06:16:37.977

Modified: 2026-03-30T13:26:29.793

Link: CVE-2026-22743

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:59:50Z

Weaknesses