Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xcfg-fcr5-gw9r | Geyser Vulnerable to Server-Side Request Forgery (SSRF) via Player Head Texture URL in Geyser |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Geysermc
Geysermc geyser |
|
| Vendors & Products |
Geysermc
Geysermc geyser |
Mon, 11 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Prior to 2.9.3, a server-side request forgery (SSRF) vulnerability exists in Geyser’s handling of Bedrock player head texture data. By supplying a crafted Base64-encoded skin texture URL via the /give command, an attacker can cause the Minecraft server to issue arbitrary HTTP GET requests to attacker-controlled or internal endpoints. This occurs server-side, without proper URL validation, and can be triggered by a Bedrock client. This vulnerability is fixed in 2.9.3. | |
| Title | Geyser: Server-Side Request Forgery (SSRF) via Player Head Texture URL | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T14:39:09.024Z
Reserved: 2026-04-25T01:53:21.583Z
Link: CVE-2026-42188
Updated: 2026-05-13T14:06:16.549Z
Status : Awaiting Analysis
Published: 2026-05-11T22:22:11.277
Modified: 2026-05-13T16:32:31.457
Link: CVE-2026-42188
No data.
OpenCVE Enrichment
Updated: 2026-05-11T23:45:03Z
Github GHSA