CVE-2026-22742: Spring AI SSRF — Patch Guide
CVE-2026-22742
Spring AI's spring-ai-bedrock-converse contains a Server-Side Request Forgery (SSRF) vulnerability in BedrockProxyChatModel when processing multimodal messages that include user-supplied media URLs. I...
Overview
A significant security vulnerability, identified as CVE-2026-22742, has been discovered in Spring AI. This flaw is a Server-Side Request Forgery (SSRF) vulnerability that affects the spring-ai-bedrock-converse module. It poses a high risk to systems using this AI integration, with a CVSS score of 8.6.
What is the Vulnerability?
In simple terms, this vulnerability exists in the BedrockProxyChatModel component when it handles messages containing media, such as images or documents, from users. The component fetches these files from URLs provided by the user. The security flaw is that it does not properly check or restrict these URLs. An attacker can craft a message with a URL that points not to a legitimate image, but to an internal system or service that should not be accessible from the outside. The Spring AI server is then tricked into making that request, potentially exposing sensitive internal data or infrastructure.
Impact and Risks
If successfully exploited, this SSRF vulnerability can have severe consequences:
- Internal Network Reconnaissance: Attackers can scan internal networks to discover other servers, databases, or administrative panels.
- Data Exposure: The server may retrieve and reveal sensitive information from internal APIs or cloud metadata services.
- Service Disruption: Requests could be sent to critical internal systems, causing denial-of-service conditions. This type of flaw is often a first step in a larger attack chain, potentially leading to data breaches. For context on the damage caused by such incidents, you can review historical data breach reports at breach reports.
Affected Versions
The vulnerability impacts the following Spring AI releases:
- Versions 1.0.0 through 1.0.4
- Versions 1.1.0 through 1.1.3
Remediation and Mitigation
The primary and most critical action is to upgrade to a patched version of Spring AI immediately.
- Update to version 1.0.5 if you are using the 1.0.x release line.
- Update to version 1.1.4 if you are using the 1.1.x release line.
These updated versions contain the necessary validation to block malicious SSRF attempts. If an immediate update is not possible, consider temporarily disabling the processing of user-supplied media URLs in the BedrockProxyChatModel as a strict interim measure. Always ensure your software dependencies are kept up-to-date to protect against known vulnerabilities. For the latest updates on such threats, follow our security news section.
Conclusion
CVE-2026-22742 is a high-severity vulnerability that requires prompt attention. Organizations using affected versions of Spring AI should prioritize applying the available patches to secure their AI-powered applications and protect their internal network from unauthorized access.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and /api/core/app/mcpTools/runTool) accept ...
OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability in the fal provider image-generation-provider.ts component that allows attackers to fetch internal URLs. A malicious or c...
A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-sid...
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint all...