CVE-2026-22743: Server-Side Request Forgery via Filter Expression Keys in Neo4jVectorStore

HIGH | MARCH 26, 2026 | CVE-2026-22743

Description

spring-ai-neo4j-store contains a Cypher injection vulnerability in Neo4jVectorFilterExpressionConverter. When a user-controlled string is passed as a filter expression key in Neo4jVectorFilterExpressionConverter of spring-ai-neo4j-store, doKey() embeds the key into a backtick-delimited Cypher property accessor (node.`metadata.`) after stripping only double quotes, without escaping embedded backticks.

Affected Spring Products and Versions

Spring AI:

  • 1.0.0 - 1.0.x
  • 1.1.0 - 1.1.x

Affected component: spring-ai-neo4j-store

Mitigation

Users of affected versions should upgrade to the corresponding fixed version.

Affected version(s) Fix version Availability
1.0.x 1.0.5 OSS
1.1.x 1.1.4 OSS

No further mitigation steps are necessary.

Credit

Identified by Cantina's AppSec agent, Apex (https://www.cantina.security/)

References

History

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all