Home

Description

Sparx Enterprise Architect software has a security feature that limits user's actions to those specified in the role. An authenticated attacker can modify the Enterprise Architect client behavior (e.g. using a debugger) and log in as any other user or administrator - then it is possible to do every possible change to the repository. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 17.1 and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

PUBLISHED Reserved 2026-04-24 | Published 2026-05-19 | Updated 2026-05-19 | Assigner CERT-PL




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-603 Use of Client-Side Authentication

Product status

Default status
unknown

Any version
affected

Credits

Blazej Adamczyk (br0x) - Efigo finder

References

cert.pl/en/posts/2026/05/CVE-2026-42096 third-party-advisory

sparxsystems.com/products/ea/ product

sploit.tech/2026/05/19/Sparx-Enterprise-Architect-PCS.html technical-description

efigo.pl/blog/CVE-2026-42096/ third-party-advisory

cve.org (CVE-2026-42098)

nvd.nist.gov (CVE-2026-42098)

Download JSON