Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Prior to 2.9.3, a server-side request forgery (SSRF) vulnerability exists in Geyser’s handling of Bedrock player head texture data. By supplying a crafted Base64-encoded skin texture URL via the /give command, an attacker can cause the Minecraft server to issue arbitrary HTTP GET requests to attacker-controlled or internal endpoints. This occurs server-side, without proper URL validation, and can be triggered by a Bedrock client. This vulnerability is fixed in 2.9.3.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xcfg-fcr5-gw9r | Geyser Vulnerable to Server-Side Request Forgery (SSRF) via Player Head Texture URL in Geyser |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 12 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Geysermc
Geysermc geyser |
|
| Vendors & Products |
Geysermc
Geysermc geyser |
Mon, 11 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Prior to 2.9.3, a server-side request forgery (SSRF) vulnerability exists in Geyser’s handling of Bedrock player head texture data. By supplying a crafted Base64-encoded skin texture URL via the /give command, an attacker can cause the Minecraft server to issue arbitrary HTTP GET requests to attacker-controlled or internal endpoints. This occurs server-side, without proper URL validation, and can be triggered by a Bedrock client. This vulnerability is fixed in 2.9.3. | |
| Title | Geyser: Server-Side Request Forgery (SSRF) via Player Head Texture URL | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T21:25:27.303Z
Reserved: 2026-04-25T01:53:21.583Z
Link: CVE-2026-42188
No data.
Status : Received
Published: 2026-05-11T22:22:11.277
Modified: 2026-05-11T22:22:11.277
Link: CVE-2026-42188
No data.
OpenCVE Enrichment
Updated: 2026-05-11T23:45:03Z
Weaknesses
Github GHSA