CVE-2026-22729

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/03/2026
Last modified:
01/04/2026

Description

A JSONPath injection vulnerability in Spring AI&amp;#39;s AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-controlled input passed to FilterExpressionBuilder is concatenated into JSONPath queries without proper escaping, enabling attackers to inject arbitrary JSONPath logic and access unauthorized documents.<br /> <br /> This vulnerability affects applications using vector stores that extend AbstractFilterExpressionConverter for multi-tenant isolation, role-based access control, or document filtering based on metadata.<br /> <br /> The vulnerability occurs when user-supplied values in filter expressions are not escaped before being inserted into JSONPath queries. Special characters like ", ||, and &amp;&amp; are passed through unescaped, allowing injection of arbitrary JSONPath logic that can alter the intended query semantics.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:* 1.0.0 (including) 1.0.4 (excluding)
cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:* 1.1.0 (including) 1.1.3 (excluding)


References to Advisories, Solutions, and Tools