Description
In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequate path normalization in the Submodel HTTP API allows an unauthenticated remote attacker to perform a path traversal attack. By supplying a maliciously crafted fileName parameter during a file upload operation, an attacker can bypass intended storage boundaries and write arbitrary files to any location on the host filesystem accessible by the Java process. This can lead to Remote Code Execution (RCE) and complete system compromise.
Published: 2026-05-05
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8gpm-h2mh-36qc Eclipse BaSyx Java Server SDK vulnerable to Path Traversal
History

Wed, 06 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Eclipse
Eclipse basyx
Vendors & Products Eclipse
Eclipse basyx

Tue, 05 May 2026 18:00:00 +0000

Type Values Removed Values Added
Title Path Traversal in BaSyx File Upload Enabling Remote Code Execution

Tue, 05 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequate path normalization in the Submodel HTTP API allows an unauthenticated remote attacker to perform a path traversal attack. By supplying a maliciously crafted fileName parameter during a file upload operation, an attacker can bypass intended storage boundaries and write arbitrary files to any location on the host filesystem accessible by the Java process. This can lead to Remote Code Execution (RCE) and complete system compromise.
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2026-05-06T15:25:50.007Z

Reserved: 2026-04-29T13:21:00.646Z

Link: CVE-2026-7411

cve-icon Vulnrichment

Updated: 2026-05-05T17:01:16.262Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-05T16:16:18.360

Modified: 2026-05-06T16:16:12.380

Link: CVE-2026-7411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T09:21:41Z

Weaknesses