CVE-2026-42097 PUBLISHED

Authentication Bypass in Sparx Pro Cloud Server

Assigner: CERT-PL
Reserved: 24.04.2026 Published: 19.05.2026 Updated: 19.05.2026

Sparx Pro Cloud Server requires authentication based on requested URL. An attacker can omit the "model" query parameter and send the model name only in the binary blob in POST request allowing SQL query execution without authentication.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Sparx Systems
Product Pro Cloud Server
Versions Default: unknown
  • affected from 0 to 6.1 (incl.)

Credits

  • Blazej Adamczyk (br0x) - Efigo finder

References

Problem Types

  • CWE-639 Authorization Bypass Through User-Controlled Key CWE

Impacts

  • CAPEC-115 Authentication Bypass