CVE-2026-22742: Spring AI: Insufficient Validation causes SSRF when processing multimodal messages with user-supplied URLs
(updated )
Spring AI’s spring-ai-bedrock-converse contains a Server-Side Request Forgery (SSRF) vulnerability in BedrockProxyChatModel when processing multimodal messages that include user-supplied media URLs. Insufficient validation of those URLs allows an attacker to induce the server to issue HTTP requests to unintended internal or external destinations.
This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
References
- github.com/advisories/GHSA-mhrg-94vw-45c5
- github.com/spring-projects/spring-ai
- github.com/spring-projects/spring-ai/commit/a7d3223bc11a010b93fbc40a17fa9b68c52a8118
- github.com/spring-projects/spring-ai/releases/tag/v1.0.5
- github.com/spring-projects/spring-ai/releases/tag/v1.1.4
- nvd.nist.gov/vuln/detail/CVE-2026-22742
- spring.io/security/cve-2026-22742
Code Behaviors & Features
Detect and mitigate CVE-2026-22742 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →