Description
In Spring AI, an attacker can bypass conversation isolation and exfiltrate sensitive memory from other users’ chat histories, including secrets and credentials, by injecting filter logic through conversationId. Only applications that use VectorStoreChatMemoryAdvisor and pass user-supplied input as a conversationId are affected.
Problem types
CWE-284 Improper Access Control
Product status
1.0.0 (OSS) before 1.0.6
1.1.0 (oss) before 1.1.5
Credits
Jinyeong Seol Seol-JY; Cantina's AppSec agent, Apex ( https://www.cantina.security )
References
spring.io/security/cve-2026-40966
nvd.nist.gov/...1&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N