<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-22738 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-22738/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 06:16:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-22738/feed.xml" rel="self" type="application/rss+xml"/><item><title>Spring AI SimpleVectorStore SpEL Injection Vulnerability (CVE-2026-22738)</title><link>https://feed.craftedsignal.io/briefs/2026-03-spring-ai-spel-injection/</link><pubDate>Fri, 27 Mar 2026 06:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-spring-ai-spel-injection/</guid><description>A SpEL injection vulnerability exists in Spring AI's SimpleVectorStore when a user-supplied value is used as a filter expression key, potentially allowing malicious actors to execute arbitrary code in vulnerable applications.</description><content:encoded>&lt;p>A SpEL (Spring Expression Language) injection vulnerability, identified as CVE-2026-22738, has been discovered in the SimpleVectorStore component of Spring AI. This flaw occurs when a user-supplied value is used as a filter expression key within SimpleVectorStore. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. The vulnerability affects Spring AI versions 1.0.0 before 1.0.5 and 1.1.0 before 1.1.4. Only applications that…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>spel-injection</category><category>spring-ai</category><category>cve-2026-22738</category><category>code-execution</category></item></channel></rss>