The vulnerability exists due to missing input sanitization.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c267-rfvc-mvpm | SQL Injection in Spring AI MariaDBFilterExpressionConverter |
| Link | Providers |
|---|---|
| https://spring.io/security/cve-2026-22730 |
|
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware spring Ai
|
|
| CPEs | cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vmware spring Ai
|
Wed, 18 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 |
Wed, 18 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring |
|
| Vendors & Products |
Vmware
Vmware spring |
Wed, 18 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization. | |
| Title | CVE-2026-22730: SQL Injection in Spring AI MariaDBFilterExpressionConverter | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-03-19T03:55:21.545Z
Reserved: 2026-01-09T06:54:41.498Z
Link: CVE-2026-22730
Updated: 2026-03-18T14:31:38.590Z
Status : Analyzed
Published: 2026-03-18T08:16:31.170
Modified: 2026-04-01T16:52:48.390
Link: CVE-2026-22730
No data.
OpenCVE Enrichment
Updated: 2026-04-02T08:00:04Z
Github GHSA