Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22729: Vulnerability in VMware Spring AI

0
High
VulnerabilityCVE-2026-22729cvecve-2026-22729
Published: Wed Mar 18 2026 (03/18/2026, 07:39:56 UTC)
Source: CVE Database V5
Vendor/Project: VMware
Product: Spring AI

Description

A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-controlled input passed to FilterExpressionBuilder is concatenated into JSONPath queries without proper escaping, enabling attackers to inject arbitrary JSONPath logic and access unauthorized documents. This vulnerability affects applications using vector stores that extend AbstractFilterExpressionConverter for multi-tenant isolation, role-based access control, or document filtering based on metadata. The vulnerability occurs when user-supplied values in filter expressions are not escaped before being inserted into JSONPath queries. Special characters like ", ||, and && are passed through unescaped, allowing injection of arbitrary JSONPath logic that can alter the intended query semantics.

AI-Powered Analysis

AILast updated: 03/18/2026, 08:12:59 UTC

Technical Analysis

CVE-2026-22729 is a JSONPath injection vulnerability found in VMware Spring AI's AbstractFilterExpressionConverter component, specifically affecting versions 1.0.x and 1.1.x. The vulnerability arises because user-supplied input used in filter expressions is concatenated directly into JSONPath queries without proper escaping or sanitization. This improper handling allows authenticated attackers to inject arbitrary JSONPath operators and logic, such as ",", "||", and "&&", which can manipulate the query semantics. The consequence is a bypass of metadata-based access controls implemented via these filter expressions, enabling unauthorized access to documents that should be restricted based on tenant isolation, roles, or metadata filters. The vulnerability is particularly relevant in environments using vector stores that extend AbstractFilterExpressionConverter for multi-tenant or role-based document filtering. The CVSS 3.1 score of 8.6 reflects a high-severity issue with network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change that impacts confidentiality but not integrity or availability. Although no public exploits are currently known, the nature of the vulnerability makes it a significant risk for data confidentiality breaches in affected deployments.

Potential Impact

The primary impact of CVE-2026-22729 is unauthorized disclosure of sensitive documents due to bypassed metadata-based access controls. Organizations relying on Spring AI's AbstractFilterExpressionConverter for multi-tenant isolation or role-based filtering may have their data segregation controls circumvented, leading to potential data leaks across tenants or roles. This can result in exposure of confidential business information, personally identifiable information (PII), or intellectual property. Since the vulnerability does not affect data integrity or availability, the main concern is confidentiality compromise. The ease of exploitation (no privileges or user interaction required) and network accessibility increase the risk of widespread exploitation once an exploit is developed. This threat is especially critical for organizations using Spring AI in regulated industries or handling sensitive data, as unauthorized access could lead to compliance violations, reputational damage, and financial loss.

Mitigation Recommendations

To mitigate CVE-2026-22729, organizations should immediately upgrade to patched versions of VMware Spring AI once available. In the absence of patches, developers should implement strict input validation and sanitization for all user-supplied filter expressions, ensuring that special characters such as ",", "||", and "&&" are properly escaped or disallowed. Employing a whitelist approach for allowed JSONPath syntax or using parameterized query mechanisms can prevent injection. Additionally, enforcing strong authentication and monitoring access logs for anomalous filter expression patterns can help detect exploitation attempts. Segmentation and least privilege principles should be applied to limit the impact of any potential breach. Finally, conducting security code reviews and penetration testing focused on JSONPath query construction can identify similar injection risks proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:41.497Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ba5b20771bdb174957e258

Added to database: 3/18/2026, 7:58:24 AM

Last enriched: 3/18/2026, 8:12:59 AM

Last updated: 3/20/2026, 8:01:59 AM

Views: 290

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses