VMware

Spring Ai

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 12.05.2026 10:17:39
  • Zuletzt bearbeitet 12.05.2026 19:25:06

A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavior ...

  • EPSS 0.03%
  • Veröffentlicht 12.05.2026 10:17:36
  • Zuletzt bearbeitet 12.05.2026 19:26:04

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

  • EPSS 0.03%
  • Veröffentlicht 09.05.2026 01:16:08
  • Zuletzt bearbeitet 12.05.2026 19:26:43

Spring AI's MilvusVectorStore#doDelete(List) implementation is vulnerable to filter-expression injection via unsanitized document IDs. Spring AI 1.0.x: affected from 1.0.0 through latest 1.0.x; upgrade to 1.0.7 or greater. Spring AI 1.1.x: affected f...

  • EPSS 0.06%
  • Veröffentlicht 28.04.2026 07:31:24
  • Zuletzt bearbeitet 29.04.2026 18:15:44

In Spring AI, a malicious PDF file can be crafted that triggers the allocation of unreasonable amounts of memory when handled by `ForkPDFLayoutTextStripper`. Affected versions: Spring AI: 1.0.0 - 1.0.5 (fixed in 1.0.6), 1.1.0 - 1.1.4 (fixed in 1.1.5...

  • EPSS 0.02%
  • Veröffentlicht 28.04.2026 07:31:21
  • Zuletzt bearbeitet 29.04.2026 18:16:16

In Spring AI, having access to a shared environment can expose the ONNX model used by the application. Affected versions: Spring AI: 1.0.0 - 1.0.5 (fixed in 1.0.6), 1.1.0 - 1.1.4 (fixed in 1.1.5)

  • EPSS 0.05%
  • Veröffentlicht 28.04.2026 07:18:53
  • Zuletzt bearbeitet 29.04.2026 18:16:36

SQL injection vulnerability in Spring AI's `CosmosDBVectorStore` allows attackers to execute arbitrary SQL queries via crafted document IDs. Affected versions: Spring AI: 1.0.0 - 1.0.5 (fixed in 1.0.6), 1.1.0 - 1.1.4 (fixed in 1.1.5)

  • EPSS 0.05%
  • Veröffentlicht 28.04.2026 06:42:36
  • Zuletzt bearbeitet 29.04.2026 18:18:01

In Spring AI, an attacker can bypass conversation isolation and exfiltrate sensitive memory from other users’ chat histories, including secrets and credentials, by injecting filter logic through conversationId. Only applications that use VectorStoreC...

  • EPSS 0.07%
  • Veröffentlicht 28.04.2026 06:03:51
  • Zuletzt bearbeitet 29.04.2026 19:04:59

In Spring AI, various FilterExpressionConverter implementations accept a filter expression object and translate them to specific vector store query languages. In several cases, keys and values are not properly escaped, leading to the ability to alter...

  • EPSS 0.06%
  • Veröffentlicht 27.03.2026 05:38:59
  • Zuletzt bearbeitet 16.04.2026 20:24:46

In RedisFilterExpressionConverter of spring-ai-redis-store, when a user-controlled string is passed as a filter value for a TAG field, stringValue() inserts the value directly into the @field:{VALUE} RediSearch TAG block without escaping characters.T...

  • EPSS 0.08%
  • Veröffentlicht 27.03.2026 05:33:20
  • Zuletzt bearbeitet 16.04.2026 20:23:14

Spring AI's spring-ai-neo4j-store contains a Cypher injection vulnerability in Neo4jVectorFilterExpressionConverter. When a user-controlled string is passed as a filter expression key in Neo4jVectorFilterExpressionConverter of spring-ai-neo4j-store, ...