CVE-2026-22730: SQLi — Patch Guide
CVE-2026-22730
Attackers exploit CVE-2026-22730 SQL injection in Spring AI to bypass access controls and execute arbitrary SQL on MariaDB databases. Upgrade to the patched Spring AI version immediately.
Vendor-confirmed - CVE-2026-22730 is a high-severity SQL injection vulnerability in the Spring AI framework’s MariaDBFilterExpressionConverter that lets attackers bypass metadata-based access controls, execute arbitrary SQL commands, and exfiltrate or corrupt the underlying MariaDB database.
Overview
A critical security vulnerability, identified as CVE-2026-22730, has been discovered in the Spring AI framework. This flaw is a SQL injection vulnerability located specifically in the MariaDBFilterExpressionConverter component. It allows attackers to bypass intended metadata-based access controls, potentially leading to unauthorized data access or system compromise.
Vulnerability Details
In simple terms, this vulnerability exists because the affected component does not properly sanitize or validate user-supplied input before using it to construct database queries. The MariaDBFilterExpressionConverter is responsible for converting filter expressions into SQL WHERE clauses for MariaDB databases.
Because this input is not cleaned, an attacker can craft malicious input that “breaks out” of the intended query structure. This allows them to inject their own SQL commands directly into the database query that the application executes. The flaw specifically undermines metadata-based security filters designed to restrict data access.
Potential Impact
The impact of this vulnerability is severe (CVSS score 8.8 - HIGH). Successful exploitation could allow an attacker to:
- Bypass Access Controls: Read, modify, or delete data they are not authorized to access.
- Execute Arbitrary Commands: Run any SQL command on the underlying MariaDB database, potentially leading to a full database compromise.
- Exfiltrate Sensitive Data: Extract confidential information, which could result in a significant data breach. For analysis of real-world data breaches, security teams often review breach reports to understand common attack patterns.
- Disrupt Operations: Corrupt or destroy database contents, causing application failure and downtime.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Remediation: The primary fix is to upgrade the Spring AI framework to a patched version that addresses this vulnerability. Consult the official Spring Security advisory for the specific version that contains the fix. Apply this update to all development, testing, and production environments that use the vulnerable component.
Temporary Mitigations (if patching is delayed):
- Input Validation: Implement strict, whitelist-based input validation on all endpoints that supply data to the
MariaDBFilterExpressionConverter. Only allow expected, safe characters. - Network Controls: Restrict network access to the affected application and its database to only trusted sources and necessary users.
- Monitoring: Review database and application logs for unusual or unexpected SQL query patterns, which can be an indicator of attempted exploitation.
Stay informed on emerging threats by following the latest security news. Organizations using Spring AI should treat this vulnerability with high priority due to its potential for direct data loss and system compromise.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
SQL injection vulnerability in Spring AI's `CosmosDBVectorStore` allows attackers to execute arbitrary SQL queries via crafted document IDs. Affected versions: Spring AI: 1.0.0 - 1.0.5 (fixed in 1.0....
Spring AI's spring-ai-bedrock-converse contains a Server-Side Request Forgery (SSRF) vulnerability in BedrockProxyChatModel when processing multimodal messages that include user-supplied media URLs. I...
A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-control...
In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. ...
Other Vmware Spring Ai Vulnerabilities
SQL injection vulnerability in Spring AI's `CosmosDBVectorStore` allows attackers to execute arbitrary SQL queries via crafted document IDs. Affected versions: Spring AI: 1.0.0 - 1.0.5 (fixed in 1.0....
In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. ...
Spring AI's spring-ai-bedrock-converse contains a Server-Side Request Forgery (SSRF) vulnerability in BedrockProxyChatModel when processing multimodal messages that include user-supplied media URLs. I...
A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-control...