Spring AI Vulnerability in Various FilterExpressionConverter Implementations
CVE-2026-40967

8.6HIGH

Key Information:

Vendor

Spring

Status
Vendor
CVE Published:
28 April 2026

What is CVE-2026-40967?

In Spring AI, certain implementations of FilterExpressionConverter fail to properly escape keys and values when translating filter expression objects to specific vector store query languages. This oversight opens avenues for attackers to manipulate and alter the intended queries, posing a risk to application integrity. The vulnerability affects versions 1.0.0 to 1.0.5 and 1.1.0 to 1.1.4, with fixes provided in subsequent releases.

Affected Version(s)

Spring AI 1.0.0 < 1.0.6

Spring AI 1.1.0 < 1.1.5

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.