CVE-2026-7412
Operation Delegation URI Validation Flaw in Eclipse BaSyx Java Server SDK
Publication date: 2026-05-05
Last updated on: 2026-05-06
Assigner: Eclipse Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eclipse | basyx_java_server_sdk | to 2.0.0-milestone-10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, specifically in the Operation Delegation feature.
The flaw is that the feature fails to validate the destination URI of delegated requests, which means an unauthenticated remote attacker can exploit this to make the server send blind HTTP POST requests to arbitrary internal or external targets.
This type of vulnerability is known as Server-Side Request Forgery (SSRF), identified as CWE-918.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated remote attackers to bypass network segmentation and access isolated internal IT/OT infrastructure or cloud metadata services. This could lead to unauthorized access to sensitive data or critical systems.
Such unauthorized access and potential data exposure may impact compliance with standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information and mandate network security controls to prevent unauthorized access.
However, the provided information does not explicitly discuss compliance implications or specific regulatory impacts.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves monitoring for unauthorized or unexpected HTTP POST requests originating from the BaSyx Java Server SDK to internal or external targets, especially those that bypass normal network segmentation.
Since the vulnerability allows blind server-side request forgery (SSRF) through the Operation Delegation feature, network administrators can look for unusual outbound HTTP POST traffic from the BaSyx server to internal IP ranges (such as 127.0.0.1, private IP ranges) or cloud metadata service endpoints (e.g., IMDS).
Suggested commands to detect suspicious activity include:
- Using tcpdump or tshark to capture outbound HTTP POST requests from the BaSyx server: tcpdump -i <interface> 'tcp and dst port 80 or 443 and src host <basyx_server_ip>'
- Using netstat or ss to check for established connections from the BaSyx server to unusual internal or external IPs: netstat -anp | grep java
- Reviewing BaSyx server logs for any Operation Delegation requests or unexpected HTTP POST operations.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading the Eclipse BaSyx Java Server SDK to version 2.0.0-milestone-10 or later, where the vulnerability has been addressed.
If upgrading is not immediately possible, implement network-level controls to block unauthorized outbound HTTP POST requests from the BaSyx server to internal or external targets, especially to sensitive internal IP ranges and cloud metadata services.
Additionally, deploy host verification and blocklisting mechanisms for HTTP operation delegation to prevent unauthorized network requests as recommended.
Review and restrict permissions of the BaSyx Java process to limit its ability to make arbitrary network requests.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can bypass network segmentation and pivot into isolated internal IT/OT infrastructure.
They can also target Cloud Metadata services such as the Instance Metadata Service (IMDS), potentially gaining sensitive information or further access.
Because the attacker can send arbitrary HTTP POST requests from the server, this can lead to unauthorized actions within protected network zones.