Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2026/VULN306
_____________________________________________________________________

DATE                : 17/03/2026

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Spring AI versions prior to
                                         1.0.4, 1.1.3.

=====================================================================
https://spring.io/security/cve-2026-22729/
https://spring.io/security/cve-2026-22730
_____________________________________________________________________


CVE-2026-22729: JSONPath Injection in Spring AI Vector Stores
FilterExpressionConverter
HIGH | MARCH 17, 2026 | CVE-2026-22729


Description

A JSONPath injection vulnerability in Spring AI's
AbstractFilterExpressionConverter allows authenticated users to bypass
metadata-based access controls through crafted filter expressions.
User-controlled input passed to FilterExpressionBuilder is concatenated
into JSONPath queries without proper escaping, enabling attackers to
inject arbitrary JSONPath logic and access unauthorized documents.

This vulnerability affects applications using vector stores that extend
AbstractFilterExpressionConverter for multi-tenant isolation, role-based
access control, or document filtering based on metadata.

The vulnerability occurs when user-supplied values in filter expressions
are not escaped before being inserted into JSONPath queries. Special
characters like ", ||, and && are passed through unescaped, allowing
injection of arbitrary JSONPath logic that can alter the intended query
semantics.


Affected Spring Products and Versions

Spring AI:

    1.0.0 - 1.0.x
    1.1.0 - 1.1.x


Mitigation

Users of affected versions should upgrade to the corresponding fixed
version.


Affected version(s) 	Fix version 	Availability
1.0.x 	1.0.4 	OSS
1.1.x 	1.1.3 	OSS

No further mitigation steps are necessary.


Credit

This issue was responsibly reported by the Blackf0g team from SecureLayer7.


References

    https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N&version=3.1

History

_____________________________________________________________________

CVE-2026-22730: SQL Injection in Spring AI MariaDBFilterExpressionConverter
HIGH | MARCH 17, 2026 | CVE-2026-22730


Description

A critical SQL injection vulnerability in Spring AI's
MariaDBFilterExpressionConverter allows attackers to bypass
metadata-based access controls and execute arbitrary SQL commands.

The vulnerability exists due to missing input sanitization.
Affected Spring Products and Versions

Spring AI:

    1.0.0 - 1.0.x
    1.1.0 - 1.1.x

Mitigation

Users of affected versions should upgrade to the corresponding fixed
version.


Affected version(s) 	Fix version 	Availability
1.0.x 	1.0.4 	OSS
1.1.x 	1.1.3 	OSS

No further mitigation steps are necessary.


Credit

This issue was responsibly reported by the Blackf0g team from
SecureLayer7.


References

    https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1

History

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




