Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-44f4-gvwj-6qg3 | Spring AI Redis Store has TAG Field Query Injection Through Improper Neutralization of Special Characters |
| Link | Providers |
|---|---|
| https://spring.io/security/cve-2026-22744 |
|
Fri, 17 Apr 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Improper Escaping of User Input in Spring AI RediSearch Filter Enables Injection | |
| Weaknesses | CWE-20 CWE-74 |
Thu, 16 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring Ai |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vmware
Vmware spring Ai |
Mon, 30 Mar 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spring
Spring spring |
|
| Vendors & Products |
Spring
Spring spring |
Fri, 27 Mar 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In RedisFilterExpressionConverter of spring-ai-redis-store, when a user-controlled string is passed as a filter value for a TAG field, stringValue() inserts the value directly into the @field:{VALUE} RediSearch TAG block without escaping characters.This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-03-27T19:39:20.156Z
Reserved: 2026-01-09T06:54:49.675Z
Link: CVE-2026-22744
No data.
Status : Analyzed
Published: 2026-03-27T06:16:38.120
Modified: 2026-04-16T20:24:46.550
Link: CVE-2026-22744
No data.
OpenCVE Enrichment
Updated: 2026-04-17T11:30:16Z
Github GHSA