Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8gpm-h2mh-36qc | Eclipse BaSyx Java Server SDK vulnerable to Path Traversal |
Wed, 06 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse basyx |
|
| Vendors & Products |
Eclipse
Eclipse basyx |
Tue, 05 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal in BaSyx File Upload Enabling Remote Code Execution |
Tue, 05 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequate path normalization in the Submodel HTTP API allows an unauthenticated remote attacker to perform a path traversal attack. By supplying a maliciously crafted fileName parameter during a file upload operation, an attacker can bypass intended storage boundaries and write arbitrary files to any location on the host filesystem accessible by the Java process. This can lead to Remote Code Execution (RCE) and complete system compromise. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2026-05-06T15:25:50.007Z
Reserved: 2026-04-29T13:21:00.646Z
Link: CVE-2026-7411
Updated: 2026-05-05T17:01:16.262Z
Status : Awaiting Analysis
Published: 2026-05-05T16:16:18.360
Modified: 2026-05-06T16:16:12.380
Link: CVE-2026-7411
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:21:41Z
Github GHSA