A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands.
The vulnerability exists due to missing input sanitization.
The vulnerability exists due to missing input sanitization.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://spring.io/security/cve-2026-22730 |
|
History
Wed, 18 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization. | |
| Title | CVE-2026-22730: SQL Injection in Spring AI MariaDBFilterExpressionConverter | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-03-18T07:36:30.533Z
Reserved: 2026-01-09T06:54:41.498Z
Link: CVE-2026-22730
No data.
Status : Received
Published: 2026-03-18T08:16:31.170
Modified: 2026-03-18T08:16:31.170
Link: CVE-2026-22730
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.