CVE-2026-42097
Description
Sparx Pro Cloud Server requires authentication based on requested URL. An attacker can omit the "model" query parameter and send the model name only in the binary blob in POST request allowing SQL query execution without authentication.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Sparx Pro Cloud Server allows SQL injection via missing authentication check on model parameter in POST requests.
Vulnerability
Sparx Pro Cloud Server versions through 6.1 (build 167) and possibly later contain an authorization bypass vulnerability (CWE-639). The server authenticates requests based on the URL, but an attacker can omit the model query parameter and instead include the model name in the binary blob of a POST request. This allows SQL query execution without any authentication [1][2].
Exploitation
An attacker with network access to the server can send a crafted POST request that omits the model query parameter and places the model name in the binary payload. No authentication or user interaction is required. The server processes the request without proper authorization, enabling SQL injection [1][2].
Impact
Successful exploitation allows an unauthenticated attacker to execute arbitrary SQL queries, leading to unauthorized read, write, or deletion of database contents. This could compromise sensitive data, alter system configurations, or disrupt service availability. The attacker gains database-level access without any prior privileges [1][2].
Mitigation
No official patch or vendor response has been provided. Only version 6.1 (build 167) and below have been confirmed vulnerable; newer versions may also be affected. Recommended mitigations include restricting network access to the server, implementing additional input validation, or disabling the vulnerable endpoint until a vendor fix is available. The vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog [1][2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=6.1 (build 167)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.