<?xml version="1.0" encoding="UTF-8"?>
<VrdaData refvuldefversion="1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://vrda.jpcert.or.jp" xsi:schemaLocation="http://vrda.jpcert.or.jp/feed/xsd/vrda_data.xsd">
  <VrdaDataProvider>
    <Name>JVN iPedia</Name>
    <URL>http://jvndb.jvn.jp</URL>
  </VrdaDataProvider>
  <VrdaDataSourceType>Advisory</VrdaDataSourceType>
  <Vulinfo revisionno="1" lang="ja" invalidated="false">
    <VulinfoID>JVNDB-2026-011767</VulinfoID>
    <VulinfoData>
      <Title>VMware&#12398;Spring AI&#12395;&#12362;&#12369;&#12427;&#19981;&#29305;&#23450;&#12398;&#33030;&#24369;&#24615;</Title>
      <VulinfoDescription>
        <Overview>spring-ai-redis-store &#12398; RedisFilterExpressionConverter &#12395;&#12362;&#12356;&#12390;&#12289;&#12518;&#12540;&#12470;&#12540;&#12364;&#21046;&#24481;&#12377;&#12427;&#25991;&#23383;&#21015;&#12364; TAG &#12501;&#12451;&#12540;&#12523;&#12489;&#12398;&#12501;&#12451;&#12523;&#12479;&#20516;&#12392;&#12375;&#12390;&#28193;&#12373;&#12428;&#12427;&#22580;&#21512;&#12289;stringValue() &#12399;&#20516;&#12434;&#25991;&#23383;&#12398;&#12456;&#12473;&#12465;&#12540;&#12503;&#20966;&#29702;&#12394;&#12375;&#12395;&#30452;&#25509; @field:{VALUE} RediSearch TAG &#12502;&#12525;&#12483;&#12463;&#12395;&#25407;&#20837;&#12375;&#12414;&#12377;&#12290;&#12371;&#12398;&#21839;&#38988;&#12399; Spring AI &#12398;&#12496;&#12540;&#12472;&#12519;&#12531; 1.0.0 &#12363;&#12425; 1.0.5 &#26410;&#28288;&#12362;&#12424;&#12403; 1.1.0 &#12363;&#12425; 1.1.4 &#26410;&#28288;&#12395;&#24433;&#38911;&#12434;&#21450;&#12412;&#12375;&#12414;&#12377;&#12290;</Overview>
      </VulinfoDescription>
      <Affected>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:vmware:spring_ai</Lapt>
        </AffectedItem>
      </Affected>
      <FactAnalysis>
      </FactAnalysis>
      <Related>
        <RelatedItem relationtype="self" origin="jvnipedia">
          <URL>https://jvndb.jvn.jp/ja/contents/2026/JVNDB-2026-011767.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Common Vulnerabilities and Exposures (CVE)</Name>
          <VulinfoID>CVE-2026-22744</VulinfoID>
          <URL>https://www.cve.org/CVERecord?id=CVE-2026-22744</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>National Vulnerability Database (NVD)</Name>
          <VulinfoID>CVE-2026-22744</VulinfoID>
          <URL>https://nvd.nist.gov/vuln/detail/CVE-2026-22744</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Spring Security Advisories</Name>
          <VulinfoID>CVE-2026-22744: RediSearch Query via Unescaped TAG Filter Values in RedisVectorStore</VulinfoID>
          <URL>https://spring.io/security/cve-2026-22744</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-noinfo</VulinfoID>
          <Title>&#24773;&#22577;&#19981;&#36275;</Title>
          <URL>https://www.ipa.go.jp/security/vuln/scap/cwe.html</URL>
        </RelatedItem>
      </Related>
      <DateFirstPublished>2026-04-20T11:42:31+09:00</DateFirstPublished>
      <DateLastUpdated>2026-04-20T11:42:31+09:00</DateLastUpdated>
    </VulinfoData>
  </Vulinfo>
</VrdaData>
