Eclipse BaSyx Java Server SDK vulnerable to Path Traversal
Critical severity
GitHub Reviewed
Published
May 5, 2026
to the GitHub Advisory Database
•
Updated May 11, 2026
Package
Affected versions
< 2.0.0-milestone-10
Patched versions
2.0.0-milestone-10
Description
Published by the National Vulnerability Database
May 5, 2026
Published to the GitHub Advisory Database
May 5, 2026
Reviewed
May 11, 2026
Last updated
May 11, 2026
In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequate path normalization in the Submodel HTTP API allows an unauthenticated remote attacker to perform a path traversal attack. By supplying a maliciously crafted fileName parameter during a file upload operation, an attacker can bypass intended storage boundaries and write arbitrary files to any location on the host filesystem accessible by the Java process. This can lead to Remote Code Execution (RCE) and complete system compromise.
References