PT-2026-35676 · Vmware · Spring Ai
Published
2026-04-28
·
Updated
2026-04-28
·
CVE-2026-40966
CVSS v3.1
5.9
Medium
| AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
In Spring AI, an attacker can bypass conversation isolation and exfiltrate sensitive memory from other users’ chat histories, including secrets and credentials, by injecting filter logic through conversationId. Only applications that use VectorStoreChatMemoryAdvisor and pass user-supplied input as a conversationId are affected.
Fix
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Spring Ai