Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gx3v-wxfj-8h24 | Eclipse BaSyx Java Server SDK vulnerable to Server-Side Request Forgery |
Wed, 06 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse basyx |
|
| Vendors & Products |
Eclipse
Eclipse basyx |
Tue, 05 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated Remote Attacker Forces Blind HTTP POST to Arbitrary URLs |
Tue, 05 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, the Operation Delegation feature fails to validate the destination URI of delegated requests. An unauthenticated remote attacker can exploit this design flaw to force the BaSyx server to execute blind HTTP POST requests to arbitrary internal or external targets. This allows an attacker to bypass network segmentation and pivot into isolated internal IT/OT infrastructure or target Cloud Metadata services (IMDS). | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2026-05-06T15:25:44.521Z
Reserved: 2026-04-29T13:23:24.237Z
Link: CVE-2026-7412
Updated: 2026-05-05T17:02:30.485Z
Status : Awaiting Analysis
Published: 2026-05-05T16:16:18.480
Modified: 2026-05-06T16:16:12.510
Link: CVE-2026-7412
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:21:40Z
Github GHSA