No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 06 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse basyx |
|
| Vendors & Products |
Eclipse
Eclipse basyx |
Tue, 05 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal in BaSyx File Upload Enabling Remote Code Execution |
Tue, 05 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequate path normalization in the Submodel HTTP API allows an unauthenticated remote attacker to perform a path traversal attack. By supplying a maliciously crafted fileName parameter during a file upload operation, an attacker can bypass intended storage boundaries and write arbitrary files to any location on the host filesystem accessible by the Java process. This can lead to Remote Code Execution (RCE) and complete system compromise. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2026-05-06T15:25:50.007Z
Reserved: 2026-04-29T13:21:00.646Z
Link: CVE-2026-7411
Updated: 2026-05-05T17:01:16.262Z
Status : Awaiting Analysis
Published: 2026-05-05T16:16:18.360
Modified: 2026-05-06T16:16:12.380
Link: CVE-2026-7411
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:21:41Z