Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:* |
Tue, 12 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring Ai |
|
| Vendors & Products |
Vmware
Vmware spring Ai |
Tue, 12 May 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavior across conversation turns. | |
| Title | Prompt Injection via Memory Poisoning in PromptChatMemoryAdvisor | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-05-12T12:11:27.971Z
Reserved: 2026-04-22T06:21:34.490Z
Link: CVE-2026-41713
Updated: 2026-05-12T12:10:26.103Z
Status : Analyzed
Published: 2026-05-12T11:16:19.517
Modified: 2026-05-12T19:25:06.597
Link: CVE-2026-41713
No data.
OpenCVE Enrichment
Updated: 2026-05-12T12:30:15Z