CVE-2026-7411
Awaiting Analysis Awaiting Analysis - Queue
Path Traversal in Eclipse BaSyx Java Server SDK

Publication date: 2026-05-05

Last updated on: 2026-05-06

Assigner: Eclipse Foundation

Description
In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequate path normalization in the Submodel HTTP API allows an unauthenticated remote attacker to perform a path traversal attack. By supplying a maliciously crafted fileName parameter during a file upload operation, an attacker can bypass intended storage boundaries and write arbitrary files to any location on the host filesystem accessible by the Java process. This can lead to Remote Code Execution (RCE) and complete system compromise.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
eclipse basyx_java_server_sdk to 2.0.0-milestone-10 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10 and involves inadequate path normalization in the Submodel HTTP API.

An unauthenticated remote attacker can exploit this flaw by supplying a maliciously crafted fileName parameter during a file upload operation.

This allows the attacker to perform a path traversal attack, bypassing intended storage boundaries and writing arbitrary files to any location on the host filesystem accessible by the Java process.

The impact of this can be severe, potentially leading to Remote Code Execution (RCE) and complete system compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated remote attackers to perform path traversal attacks and write arbitrary files on the host filesystem, potentially leading to remote code execution and full system compromise.

Such a severe security flaw can lead to unauthorized access, data breaches, and loss of data integrity and availability, which are critical concerns under common standards and regulations like GDPR and HIPAA.

Failure to protect sensitive data and maintain system security as required by these regulations could result in non-compliance, legal penalties, and reputational damage.


How can this vulnerability impact me? :

Exploitation of this vulnerability allows an unauthenticated attacker to write arbitrary files anywhere on the host filesystem where the Java process has write permissions.

This can lead to Remote Code Execution (RCE), meaning the attacker can execute malicious code on the affected system.

As a result, the attacker can gain full control over the compromised system, potentially leading to data theft, system disruption, or further attacks within the network.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Eclipse BaSyx Java Server SDK to version 2.0.0-milestone-10 or later, where the path normalization issue has been fixed.

Additionally, implement strict path normalization and boundary checks for file operations in the Submodel HTTP API to prevent path traversal attacks.

Deploy host verification and blocklisting mechanisms for HTTP operation delegation to prevent unauthorized network requests and reduce the risk of exploitation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring and analyzing HTTP requests to the Submodel API's file upload endpoint for suspicious or malicious fileName parameters that attempt path traversal sequences (e.g., ../ or ..\).

You can use network traffic inspection tools like tcpdump or Wireshark to capture HTTP requests and grep or filter for suspicious patterns in the fileName parameter.

  • Use tcpdump to capture HTTP traffic on the server port (e.g., 8080): tcpdump -A -s 0 'tcp port 8080 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)'
  • Filter captured traffic for suspicious fileName parameters containing path traversal sequences: grep -i 'fileName=.*\.\./' captured_traffic.log

Additionally, reviewing server logs for file upload requests with unusual file paths or unexpected file write locations can help detect exploitation attempts.

Since the vulnerability allows unauthenticated remote attackers to write arbitrary files, monitoring for unexpected file creations or modifications on the host filesystem in directories outside the intended storage boundaries is also recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart