CVE-2026-22738: SpEL Injection via Unescaped Filter Key in SimpleVectorStore Leads to Remote Code Execution

CRITICAL | MARCH 26, 2026 | CVE-2026-22738

Description

In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code.

Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected.

Affected Spring Products and Versions

Spring AI:

  • 1.0.0 - 1.0.x
  • 1.1.0 - 1.1.x

Mitigation

Users of affected versions should upgrade to the corresponding fixed version.

Affected version(s) Fix version Availability
1.0.x 1.0.5 OSS
1.1.x 1.1.4 OSS

No further mitigation steps are necessary.

Credit

The issue was reported responsibly by

References

History

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all