PatchSiren cyber security CVE debrief
CVE-2026-41705 Spring CVE debrief
CVE-2026-41705 affects Spring AI's MilvusVectorStore#doDelete(List) path, where unsanitized document IDs can be used to inject filter expressions. The vendor guidance says Spring AI 1.0.x should be upgraded to 1.0.7 or later, and Spring AI 1.1.x should be upgraded to 1.1.6 or later.
- Vendor
- Spring
- Product
- Unknown
- CVSS
- HIGH 8.6
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-09
- Original CVE updated
- 2026-05-09
- Advisory published
- 2026-05-09
- Advisory updated
- 2026-05-09
Who should care
Security and application teams running Spring AI deployments that use MilvusVectorStore deletion flows, especially when document IDs may be influenced by untrusted input.
Technical summary
The official record and vendor advisory describe a filter-expression injection issue in MilvusVectorStore#doDelete(List). Because document IDs are incorporated without proper sanitization, attacker-controlled values can alter the generated filter expression used during deletion. NVD maps the weakness to CWE-917 and publishes a CVSS 3.1 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L, indicating a remotely reachable issue with no privileges or user interaction required and a high confidentiality impact.
Defensive priority
High priority for any environment using the affected Spring AI MilvusVectorStore code path. Prioritize remediation if deletion requests can be reached by untrusted users or downstream services.
Recommended defensive actions
- Upgrade Spring AI to 1.0.7 or later if you are on the 1.0.x line, or to 1.1.6 or later if you are on the 1.1.x line.
- Review all callers of MilvusVectorStore#doDelete(List) and ensure document IDs are treated as untrusted input.
- Add allowlisting and validation for document IDs before they are used in deletion/filter construction.
- Test the delete path with malformed or unexpected IDs and add regression coverage for injection-resistant handling.
- Confirm that any exposed service using this path is patched across all deployed environments, including test and staging instances.
Evidence notes
This debrief is based on the NVD CVE entry, which lists the CVSS vector and CWE-917 mapping, and the Spring vendor advisory reference at spring.io/security/cve-2026-41705, which provides the affected-version and upgrade guidance. Timing is based on the supplied CVE published timestamp of 2026-05-09T01:16:08.690Z.
Official resources
-
CVE-2026-41705 CVE record
CVE.org
-
CVE-2026-41705 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
Publicly disclosed on 2026-05-09, based on the CVE published timestamp supplied in the source corpus.