🔐 CVE Alert

CVE-2026-42097

UNKNOWN 0.0

Authentication Bypass in Sparx Pro Cloud Server

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Sparx Pro Cloud Server requires authentication based on requested URL. An attacker can omit the "model" query parameter and send the model name only in the binary blob in POST request allowing SQL query execution without authentication. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

CWE CWE-639
Vendor sparx systems
Product pro cloud server
Published May 19, 2026
Last Updated May 19, 2026
Stay Ahead of the Next One

Get instant alerts for sparx systems pro cloud server

Be the first to know when new unknown vulnerabilities affecting sparx systems pro cloud server are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Sparx Systems / Pro Cloud Server
0 ≤ 6.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
cert.pl: https://cert.pl/en/posts/2026/05/CVE-2026-42096 sparxsystems.com: https://sparxsystems.com/products/procloudserver/ sploit.tech: https://sploit.tech/2026/05/19/Sparx-Enterprise-Architect-PCS.html efigo.pl: https://efigo.pl/blog/CVE-2026-42096/

Credits

Blazej Adamczyk (br0x) - Efigo