Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1483 articles · 105577 vulns · 38/41 feeds (7d)
← Back to list
9.8
CVE-2026-22738EXPLOITED
spring · spring ai

SpEL Injection via Unescaped Filter Key in SimpleVectorStore Leads to Remote Code Execution

Description

In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.

Affected Products

VendorProductVersions
springspring ai1.0.0, 1.1.0

References

  • https://spring.io/security/cve-2026-22738

Related News (2 articles)

Tier C
VulDB18h ago
CVE-2026-22738 | VMware Spring AI up to 1.0.4/1.1.3 injection
→ No new info (linked only)
Tier B
CERT-FR1d ago
Multiples vulnérabilités dans Spring AI (27 mars 2026)
→ No new info (linked only)
CVSS 3.19.8 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited✅ Yes
Published3/27/2026
Last enriched9h agov4
Trending Score69
Source articles2
Independent2
Info Completeness8/14
Missing: epss, cwe, kev, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v4
Last enriched 9h ago
v4Tier B9h ago

Updated exploit availability to true and marked as actively exploited.

exploitAvailableactivelyExploited
via CERT-FR
v3Tier C17h ago

Updated exploit availability to false and actively exploited status to false.

cvssEstimate
via VulDB
v2Tier C18h ago

Updated vendor to VMware, affected versions to 1.0.4 and 1.1.3, and severity to HIGH.

vendoraffectedVersionsseverity
via VulDB
v119h ago

Initial creation