CVE-2026-22744: RediSearch Query via Unescaped TAG Filter Values in RedisVectorStore

HIGH | MARCH 26, 2026 | CVE-2026-22744

Description

In RedisFilterExpressionConverter of spring-ai-redis-store, when a user-controlled string is passed as a filter value for a TAG field, stringValue() inserts the value directly into the @field:{VALUE} RediSearch TAG block without escaping characters.

Affected Spring Products and Versions

Spring AI:

  • 1.0.0 - 1.0.x
  • 1.1.0 - 1.1.x

Affected component: spring-ai-redis-store

Mitigation

Users of affected versions should upgrade to the corresponding fixed version.

Affected version(s) Fix version Availability
1.0.x 1.0.5 OSS
1.1.x 1.1.4 OSS

No further mitigation steps are necessary.

Credit

The issue was reported responsibly by Hyunwoo Kim (@V4bel)

References

History

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all