SpEL Injection via Unescaped Filter Key in SimpleVectorStore Leads to Remote Code Execution
Title source: cnaDescription
In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Exploits (2)
References (1)
Scores
CVSS v3
9.8
EPSS
0.0004
EPSS Percentile
13.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
Details
CWE
CWE-917
Status
published
Products (4)
org.springframework.ai/spring-ai-vector-store
1.0.0 - 1.0.5Maven
Spring/Spring AI
1.0.0 - 1.0.5
Spring/Spring AI
1.1.0 - 1.1.4
vmware/spring_ai
1.0.0 - 1.0.5
Published
Mar 27, 2026
Tracked Since
Mar 27, 2026