CVE-2026-42097
Authentication Bypass in Sparx Pro Cloud Server
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Sparx Pro Cloud Server requires authentication based on requested URL. An attacker can omit the "model" query parameter and send the model name only in the binary blob in POST request allowing SQL query execution without authentication. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
| CWE | CWE-639 |
| Vendor | sparx systems |
| Product | pro cloud server |
| Published | May 19, 2026 |
| Last Updated | May 19, 2026 |
Stay Ahead of the Next One
Get instant alerts for sparx systems pro cloud server
Be the first to know when new unknown vulnerabilities affecting sparx systems pro cloud server are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Sparx Systems / Pro Cloud Server
0 ≤ 6.1
References
Credits
Blazej Adamczyk (br0x) - Efigo