In RedisFilterExpressionConverter of spring-ai-redis-store, when a user-controlled string is passed as a filter value for a TAG field, stringValue() inserts the value directly into the @field:{VALUE} RediSearch TAG block without escaping characters.This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.
Project Subscriptions
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-44f4-gvwj-6qg3 | Spring AI Redis Store has TAG Field Query Injection Through Improper Neutralization of Special Characters |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://spring.io/security/cve-2026-22744 |
|
History
Fri, 17 Apr 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Improper Escaping of User Input in Spring AI RediSearch Filter Enables Injection | |
| Weaknesses | CWE-20 CWE-74 |
Thu, 16 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring Ai |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:vmware:spring_ai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vmware
Vmware spring Ai |
Mon, 30 Mar 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spring
Spring spring |
|
| Vendors & Products |
Spring
Spring spring |
Fri, 27 Mar 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In RedisFilterExpressionConverter of spring-ai-redis-store, when a user-controlled string is passed as a filter value for a TAG field, stringValue() inserts the value directly into the @field:{VALUE} RediSearch TAG block without escaping characters.This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4. | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-03-27T19:39:20.156Z
Reserved: 2026-01-09T06:54:49.675Z
Link: CVE-2026-22744
No data.
Status : Analyzed
Published: 2026-03-27T06:16:38.120
Modified: 2026-04-16T20:24:46.550
Link: CVE-2026-22744
No data.
OpenCVE Enrichment
Updated: 2026-04-17T11:30:16Z
Weaknesses
Github GHSA