Description
An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5.2.1 (5.2.1 is used in guardsix 7.9.0.0). A logic flaw allowed stored database credentials to be reused after modification of the target Host, IP address, or Port. When editing an existing Enrichment Source, previously stored credentials were retained even if the connection endpoint was changed. An authenticated Operator user could redirect the database connection to unintended internal systems, resulting in SSRF and potential misuse of valid stored credentials.
Published: 2026-04-22
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery with credential reuse
Action: Apply Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Guardsix logpoint
Guardsix odbc
CPEs cpe:2.3:a:guardsix:logpoint:*:*:*:*:*:*:*:*
cpe:2.3:a:guardsix:odbc:*:*:*:*:*:*:*:*
Vendors & Products Guardsix logpoint
Guardsix odbc

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Guardsix
Guardsix odbc Enrichment Plugins
Vendors & Products Guardsix
Guardsix odbc Enrichment Plugins

Mon, 27 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Title Logic Flaw in ODBC Enrichment Plugins Allows SSRF via Reused Credentials

Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5.2.1 (5.2.1 is used in guardsix 7.9.0.0). A logic flaw allowed stored database credentials to be reused after modification of the target Host, IP address, or Port. When editing an existing Enrichment Source, previously stored credentials were retained even if the connection endpoint was changed. An authenticated Operator user could redirect the database connection to unintended internal systems, resulting in SSRF and potential misuse of valid stored credentials.
References

Subscriptions

Guardsix Logpoint Odbc Odbc Enrichment Plugins
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T15:21:32.153Z

Reserved: 2026-04-03T00:00:00.000Z

Link: CVE-2026-35548

cve-icon Vulnrichment

Updated: 2026-04-22T15:07:23.969Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T15:16:16.100

Modified: 2026-05-12T20:05:07.647

Link: CVE-2026-35548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T20:21:10Z

Weaknesses