CVE-2026-22744: Spring AI Redis Store has TAG Field Query Injection Through Improper Neutralization of Special Characters
(updated )
In RedisFilterExpressionConverter of spring-ai-redis-store, when a user-controlled string is passed as a filter value for a TAG field, stringValue() inserts the value directly into the @field:{VALUE} RediSearch TAG block without escaping characters. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
References
- github.com/advisories/GHSA-44f4-gvwj-6qg3
- github.com/spring-projects/spring-ai
- github.com/spring-projects/spring-ai/commit/707e990c9152aabb9c9226053725efa2ada72223
- github.com/spring-projects/spring-ai/releases/tag/v1.0.5
- github.com/spring-projects/spring-ai/releases/tag/v1.1.4
- nvd.nist.gov/vuln/detail/CVE-2026-22744
- spring.io/security/cve-2026-22744
Code Behaviors & Features
Detect and mitigate CVE-2026-22744 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →