CVE-2026-22738

CRITICAL LAB

SpEL Injection via Unescaped Filter Key in SimpleVectorStore Leads to Remote Code Execution

Title source: cna

Description

In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.

Exploits (2)

nomisec STUB
by rockmelodies · poc
https://github.com/rockmelodies/CVE-2026-22738
nomisec WORKING POC
by n0n4m3x41 · poc
https://github.com/n0n4m3x41/CVE-2026-22738-POC

Scores

CVSS v3 9.8
EPSS 0.0004
EPSS Percentile 13.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull eclipse-temurin:21-jre-jammy

Details

CWE
CWE-917
Status published
Products (4)
org.springframework.ai/spring-ai-vector-store 1.0.0 - 1.0.5Maven
Spring/Spring AI 1.0.0 - 1.0.5
Spring/Spring AI 1.1.0 - 1.1.4
vmware/spring_ai 1.0.0 - 1.0.5
Published Mar 27, 2026
Tracked Since Mar 27, 2026