Home

Description

In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequate path normalization in the Submodel HTTP API allows an unauthenticated remote attacker to perform a path traversal attack. By supplying a maliciously crafted fileName parameter during a file upload operation, an attacker can bypass intended storage boundaries and write arbitrary files to any location on the host filesystem accessible by the Java process. This can lead to Remote Code Execution (RCE) and complete system compromise.

PUBLISHED Reserved 2026-04-29 | Published 2026-05-05 | Updated 2026-05-06 | Assigner eclipse




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory

Product status

Default status
unaffected

Any version before 2.0.0-milestone-10
affected

Credits

Mohamed Lemine Ahmed Jidou (AegisSec) finder

References

gitlab.eclipse.org/...ity/vulnerability-reports/-/issues/423 exploit

gitlab.eclipse.org/...ity/vulnerability-reports/-/issues/423

gitlab.eclipse.org/security/cve-assignment/-/issues/102

cve.org (CVE-2026-7411)

nvd.nist.gov (CVE-2026-7411)

Download JSON