Changeflow GovPing Data Privacy & Cybersecurity CERT-FR: Multiple Spring AI Vulnerabilities, SQ...
Priority review Notice Added Final

CERT-FR: Multiple Spring AI Vulnerabilities, SQL Injection Risks

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published March 17th, 2026
Detected March 17th, 2026
Email

Summary

CERT-FR has issued an advisory regarding multiple vulnerabilities in Spring AI, versions 1.0.x prior to 1.0.4 and 1.1.x prior to 1.1.3. These vulnerabilities allow for SQL injection and security policy bypass. Users are advised to consult the vendor's security bulletins for patch information.

What changed

CERT-FR has released an advisory (CERTFR-2026-AVI-0305) detailing multiple critical vulnerabilities discovered in Spring AI software. The identified issues, tracked as CVE-2026-22729 and CVE-2026-22730, affect Spring AI versions 1.0.x prior to 1.0.4 and 1.1.x prior to 1.1.3. Exploitation of these vulnerabilities could lead to SQL injection attacks and allow attackers to bypass security policies.

Organizations utilizing affected versions of Spring AI must immediately consult the provided security bulletins from Spring and apply the necessary patches or updates. Failure to address these vulnerabilities could expose systems to data breaches and unauthorized access. While no specific compliance deadline is mentioned, prompt remediation is critical to mitigate security risks.

What to do next

  1. Review Spring AI version usage and identify affected installations (1.0.x < 1.0.4, 1.1.x < 1.1.3).
  2. Consult Spring security bulletins for CVE-2026-22729 and CVE-2026-22730.
  3. Apply vendor-provided patches or updates to mitigate SQL injection and security policy bypass risks.

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 17 mars 2026 N° CERTFR-2026-AVI-0305 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans Spring AI

Gestion du document

| Référence | CERTFR-2026-AVI-0305 |
| Titre | Multiples vulnérabilités dans Spring AI |
| Date de la première version | 17 mars 2026 |
| Date de la dernière version | 17 mars 2026 |
| Source(s) | Bulletin de sécurité Spring cve-2026-22729 du 17 mars 2026
Bulletin de sécurité Spring cve-2026-22730 du 17 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Contournement de la politique de sécurité
  • Injection SQL (SQLi)

Systèmes affectés

  • Spring versions 1.0.x antérieures à 1.0.4
  • Spring versions 1.1.x antérieures à 1.1.3

Résumé

De multiples vulnérabilités ont été découvertes dans Spring AI. Elles permettent à un attaquant de provoquer une injection SQL (SQLi) et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 17 mars 2026 Version initiale

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
March 17th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Manufacturers Technology companies
Geographic scope
National (France)

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Data Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.