Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22744: Vulnerability in Spring Spring AI

0
High
VulnerabilityCVE-2026-22744cvecve-2026-22744
Published: Fri Mar 27 2026 (03/27/2026, 05:38:59 UTC)
Source: CVE Database V5
Vendor/Project: Spring
Product: Spring AI

Description

In RedisFilterExpressionConverter of spring-ai-redis-store, when a user-controlled string is passed as a filter value for a TAG field, stringValue() inserts the value directly into the @field:{VALUE} RediSearch TAG block without escaping characters.This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 06:15:45 UTC

Technical Analysis

CVE-2026-22744 is a vulnerability identified in the RedisFilterExpressionConverter component of the spring-ai-redis-store module within Spring AI versions 1.0.0 to before 1.0.5 and 1.1.0 to before 1.1.4. The root cause is the improper handling of user-supplied strings used as filter values for TAG fields in RediSearch queries. Specifically, the stringValue() method inserts these values directly into the @field:{VALUE} RediSearch TAG block without escaping special characters. This lack of sanitization allows an attacker to craft malicious input that can manipulate the RediSearch query syntax, potentially enabling injection attacks. Such injections could allow unauthorized access to sensitive data by bypassing intended query filters, thereby compromising confidentiality. The vulnerability does not affect data integrity or availability, and exploitation does not require authentication or user interaction, making it remotely exploitable over the network. Although no known exploits have been reported in the wild, the vulnerability's presence in widely used Spring AI versions combined with Redis and RediSearch integration poses a significant risk. The CVSS v3.1 base score of 7.5 reflects these factors, highlighting the need for prompt remediation. The vulnerability was reserved in January 2026 and published in March 2026, with no official patches linked yet, indicating that users should monitor vendor advisories closely.

Potential Impact

The primary impact of CVE-2026-22744 is the potential unauthorized disclosure of sensitive information stored or queried via RediSearch in Spring AI applications. Attackers can exploit the injection flaw to bypass query filters and retrieve data that should be restricted, leading to confidentiality breaches. This can affect organizations relying on Spring AI for AI-driven data processing and Redis as a backend, including sectors handling sensitive or regulated data such as finance, healthcare, and government. While the vulnerability does not affect data integrity or system availability, the exposure of confidential data can result in compliance violations, reputational damage, and financial losses. The ease of remote exploitation without authentication increases the threat landscape, especially for internet-facing services or poorly segmented internal networks. Organizations with automated AI workflows using Spring AI and Redis are particularly vulnerable, as attackers could leverage this flaw to extract data at scale. The absence of known exploits currently provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

To mitigate CVE-2026-22744, organizations should first monitor Spring AI vendor communications for official patches and apply updates to versions 1.0.5 or later and 1.1.4 or later as soon as they become available. In the interim, developers should implement input validation and sanitization on all user-supplied strings used in RediSearch TAG filters to ensure special characters are properly escaped or rejected. Employing a whitelist approach for allowed characters in filter values can reduce injection risks. Additionally, restricting network access to Redis and Spring AI services to trusted internal hosts and enforcing strict authentication and authorization controls can limit exposure. Logging and monitoring query patterns for anomalous or malformed filter inputs can help detect exploitation attempts early. Where feasible, consider isolating AI and Redis components in segmented network zones with minimal exposure. Finally, conduct security code reviews and penetration testing focused on RediSearch query construction to identify and remediate similar injection vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:49.675Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c61cf33c064ed76f585816

Added to database: 3/27/2026, 6:00:19 AM

Last enriched: 3/27/2026, 6:15:45 AM

Last updated: 3/28/2026, 12:23:22 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses