<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Spring-Ai — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/spring-ai/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 06:16:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/spring-ai/feed.xml" rel="self" type="application/rss+xml"/><item><title>Spring AI Redis Store TAG Injection Vulnerability (CVE-2026-22744)</title><link>https://feed.craftedsignal.io/briefs/2026-03-spring-ai-redis-injection/</link><pubDate>Fri, 27 Mar 2026 06:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-spring-ai-redis-injection/</guid><description>CVE-2026-22744 is a code injection vulnerability in Spring AI's RedisFilterExpressionConverter which allows an attacker to inject arbitrary commands into RediSearch TAG blocks via unescaped user-controlled strings, affecting versions 1.0.0 before 1.0.5 and 1.1.0 before 1.1.4.</description><content:encoded><![CDATA[<p>CVE-2026-22744 is a critical vulnerability found within the <code>RedisFilterExpressionConverter</code> of the Spring AI Redis Store. The vulnerability arises because the <code>stringValue()</code> function directly inserts user-supplied strings into the <code>@field:{VALUE}</code> RediSearch TAG block without proper sanitization or escaping. This allows an attacker to inject arbitrary commands or data into the Redis database if they can control the input used as a filter value for a TAG field. This vulnerability affects…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>injection</category><category>spring-ai</category><category>redis</category></item><item><title>Spring AI SimpleVectorStore SpEL Injection Vulnerability (CVE-2026-22738)</title><link>https://feed.craftedsignal.io/briefs/2026-03-spring-ai-spel-injection/</link><pubDate>Fri, 27 Mar 2026 06:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-spring-ai-spel-injection/</guid><description>A SpEL injection vulnerability exists in Spring AI's SimpleVectorStore when a user-supplied value is used as a filter expression key, potentially allowing malicious actors to execute arbitrary code in vulnerable applications.</description><content:encoded>&lt;p>A SpEL (Spring Expression Language) injection vulnerability, identified as CVE-2026-22738, has been discovered in the SimpleVectorStore component of Spring AI. This flaw occurs when a user-supplied value is used as a filter expression key within SimpleVectorStore. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. The vulnerability affects Spring AI versions 1.0.0 before 1.0.5 and 1.1.0 before 1.1.4. Only applications that…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>spel-injection</category><category>spring-ai</category><category>cve-2026-22738</category><category>code-execution</category></item><item><title>Spring AI BedrockProxyChatModel SSRF Vulnerability (CVE-2026-22742)</title><link>https://feed.craftedsignal.io/briefs/2026-03-spring-ai-ssrf/</link><pubDate>Fri, 27 Mar 2026 06:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-spring-ai-ssrf/</guid><description>Spring AI's spring-ai-bedrock-converse library is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied media URLs in multimodal messages, allowing attackers to trigger HTTP requests to internal or external destinations.</description><content:encoded>&lt;p>A Server-Side Request Forgery (SSRF) vulnerability has been identified in the spring-ai-bedrock-converse library within Spring AI. The vulnerability resides in the BedrockProxyChatModel component and arises during the processing of multimodal messages. Specifically, when handling user-supplied media URLs, the application fails to adequately validate these URLs. This lack of validation allows a malicious actor to inject arbitrary URLs, potentially causing the server to make unintended HTTP…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>spring-ai</category><category>bedrockproxychatmodel</category><category>cve-2026-22742</category></item><item><title>CVE-2026-22729: JSONPath Injection Vulnerability in Spring AI's PgVectorStore</title><link>https://feed.craftedsignal.io/briefs/2024-06-spring-ai-jsonpath-injection/</link><pubDate>Thu, 19 Mar 2026 12:35:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-spring-ai-jsonpath-injection/</guid><description>CVE-2026-22729 is a JSONPath Injection vulnerability found in Spring AI's PgVectorStore, potentially allowing for unauthorized data access or modification.</description><content:encoded>&lt;p>CVE-2026-22729 is a newly identified JSONPath Injection vulnerability affecting the PgVectorStore component within the Spring AI framework. The vulnerability arises from insufficient input sanitization when processing JSONPath expressions, potentially allowing attackers to inject malicious code into queries. Successful exploitation could lead to unauthorized data access, modification, or even remote code execution depending on the application&amp;rsquo;s configuration and permissions. This vulnerability…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-22729</category><category>jsonpath-injection</category><category>spring-ai</category></item></channel></rss>