Home

Description

In Spring AI, an attacker can bypass conversation isolation and exfiltrate sensitive memory from other users’ chat histories, including secrets and credentials, by injecting filter logic through conversationId. Only applications that use VectorStoreChatMemoryAdvisor and pass user-supplied input as a conversationId are affected.

PUBLISHED Reserved 2026-04-16 | Published 2026-04-28 | Updated 2026-04-28 | Assigner vmware




MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-284 Improper Access Control

Product status

Default status
unaffected

1.0.0 (OSS) before 1.0.6
affected

1.1.0 (oss) before 1.1.5
affected

Credits

Jinyeong Seol Seol-JY; Cantina's AppSec agent, Apex ( https://www.cantina.security ) finder

References

spring.io/security/cve-2026-40966

nvd.nist.gov/...1&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

cve.org (CVE-2026-40966)

nvd.nist.gov (CVE-2026-40966)

Download JSON