CVE-2026-22738: Spring AI: SpEL injection is triggered when a user-supplied value is used as a filter expression key
(updated )
In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected.
This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
References
- github.com/advisories/GHSA-fvh3-672c-7p6c
- github.com/spring-projects/spring-ai
- github.com/spring-projects/spring-ai/commit/ba9220b22383e430d5f801ce8e4fa01cf9e75f29
- github.com/spring-projects/spring-ai/releases/tag/v1.0.5
- github.com/spring-projects/spring-ai/releases/tag/v1.1.4
- nvd.nist.gov/vuln/detail/CVE-2026-22738
- spring.io/security/cve-2026-22738
Code Behaviors & Features
Detect and mitigate CVE-2026-22738 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →