Description
A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavior across conversation turns.
Published: 2026-05-12
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A malicious user can craft input that is stored in the PromptChatMemoryAdvisor conversation memory and later interpreted by the model in an unintended way. The affected advisor leads to manipulation of model behavior across conversation turns, effectively allowing a user to influence or hijack the model’s responses. This flaw is a form of prompt injection that could degrade confidentiality or integrity of the application’s decisions and outputs.

Affected Systems

The vulnerability affects VMware:Spring AI PromptChatMemoryAdvisor. No specific affected versions are provided in the current data, so any deployed instance of this advisor should be inspected for the presence of the flaw.

Risk and Exploitability

The CVSS score of 8.2 indicates a high severity assessment. EPSS data are not available, and the flaw is not listed in CISA’s Known Exploited Vulnerabilities catalog, implying the broader threat landscape for this issue is currently unknown. The attack vector is inferred to be remote, as any user providing input that is persisted in memory could trigger the misuse of the model without needing privileged access. The exploitation requires only the ability to supply crafted input to the advisor, making the vulnerability highly accessible to legitimate users.

Generated by OpenCVE AI on May 12, 2026 at 12:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a version of PromptChatMemoryAdvisor that contains the vendor’s fix for the memory poisoning flaw.
  • Prior to storing user input, perform strict validation and sanitization to remove or neutralize characters that could influence prompt parsing.
  • Restrict access to the memory advisor or the conversation memory to trusted users or contexts, limiting the exposure of stored input to potential exploitation.

Generated by OpenCVE AI on May 12, 2026 at 12:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:*

Tue, 12 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Vmware
Vmware spring Ai
Vendors & Products Vmware
Vmware spring Ai

Tue, 12 May 2026 11:15:00 +0000

Type Values Removed Values Added
Description A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavior across conversation turns.
Title Prompt Injection via Memory Poisoning in PromptChatMemoryAdvisor
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}


Subscriptions

Vmware Spring Ai
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-05-12T12:11:27.971Z

Reserved: 2026-04-22T06:21:34.490Z

Link: CVE-2026-41713

cve-icon Vulnrichment

Updated: 2026-05-12T12:10:26.103Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-12T11:16:19.517

Modified: 2026-05-12T19:25:06.597

Link: CVE-2026-41713

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T12:30:15Z

Weaknesses