.NET Reflection based Server Side Template Injection in WynEnterprise. Vulnerability write-up from our expert Maksym Brzęczek.

| CVEs | CVE-2026-42096, CVE-2026-42097, CVE-2026-42098, CVE-2026-42099, CVE-2026-42100 |
|---|---|
| Affected Products | Sparx Pro Cloud Server ≤ 6.1 build 167 Sparx Enterprise Architect ≤ 17.1 |
| Chained CVSSv4 Score | Critical |
If you answered yes to all three, your organization is in the high-risk group. The vulnerabilities described in this advisory are actively exploitable against your current setup.
Not sure about your version or exposure?
Request a free assessment →If your organization uses Sparx Enterprise Architect and your team accesses it over the internet, you may be exposed to an immediate and critical threat - regardless of how your security is configured.
The vulnerabilities described in this advisory allow an external attacker with no credentials, no insider knowledge, and no specialized skills to silently read or destroy your entire architecture repository, steal employee credentials, and execute arbitrary code on your server.
Your intellectual property, system designs, and business roadmaps could be exfiltrated in minutes. This is not a theoretical risk, its working exploit chain. If you are running an internet-accessible Pro Cloud Server today, assume you are at risk.
Critical security vulnerabilities have been identified and responsibly disclosed by the Efigo Research Team in two widely-used enterprise software products from Sparx Systems: Enterprise Architect (EA) and Pro Cloud Server (PCS). These vulnerabilities expose organizations to severe risks including unauthenticated remote code execution, arbitrary SQL execution, authentication bypass, and denial of service — all exploitable from the public internet without requiring any user credentials.
Five CVEs (CVE-2026-42096 through CVE-2026-42100) have been assigned. When chained, these vulnerabilities yield a perfect CVSSv4 score of 10.0. Any organization deploying PCS with WebEA in a network-accessible configuration faces immediate risk of full system compromise and data exfiltration.
Immediate action required: Isolate PCS and WebEA from public-facing networks now. Apply vendor patches as soon as they become available and follow the remediation steps section.
| Product | Affected Versions | Vulnerable Component |
|---|---|---|
| Sparx Pro Cloud Server | ≤ 6.1 build 167 | HTTP endpoint, WebEA PHP app, authentication layer |
| Sparx Enterprise Architect | ≤ 17.1 | Client binary, role-based access control layer |
| CVE | Title | CVSSv4 | Severity | Primary Impact |
|---|---|---|---|---|
| CVE-2026-42096 | Broken Access Control — SQL Command Execution | 8.7 | High | Unauthenticated arbitrary SQL read/write |
| CVE-2026-42097 | Authentication Bypass in PCS | 9.3 | Critical | Full auth bypass enabling unauthenticated SQL |
| CVE-2026-42098 | Authorization Bypass in Enterprise Architect | 8.7 | High | Any user can act as admin, bypass RBAC |
| CVE-2026-42099 | Remote Code Execution via WebEA Race Condition | 7.7 | High | Arbitrary OS code execution on server |
| CVE-2026-42100 | Denial of Service in /SparxCloudLink.sseap | 7.1 | High | Unauthenticated service crash / potential RCE |
Root cause: PCS acts as a transparent database proxy for the thick EA client. All SQL queries are submitted directly by the client over HTTP with only a symmetric encryption layer — the key is embedded in the publicly downloadable EA trial binary, providing no meaningful protection. An attacker can extract the key and forge arbitrary SQL queries against any configured database.
Business impact:
t_secuser, enabling offline password cracking and lateral movement.Root cause: PCS determines which authentication path to apply based on the model name in the URL query parameter. However, the SQL execution logic reads the model name from the binary POST body instead. An attacker can omit the URL query parameter (bypassing the authentication check) while still supplying the model name in the POST body, causing PCS to execute the query with no authentication challenge.
Business impact:
Root cause: The client-side EA binary performs authorization checks locally rather than enforcing them server-side. An attacker can patch or debug the EA binary to bypass role checks and log in with administrator privileges, or impersonate any user. Sparx's own documentation acknowledges the security model is "designed to facilitate collaboration, not as a barrier to incursion," yet the product is marketed with RBAC and audit-trail guarantees.
Business impact:
Root cause: The WebEA PHP component writes attacker-controlled file content and filenames directly to the web-accessible directory as a temporary download step. Because the filename is not sanitized and the file is not deleted before being served, an attacker can inject a malicious .php file and exploit the TOCTOU window to execute it via a parallel HTTP request before deletion occurs.
Business impact:
Root cause: Sending a malformed SQL query containing an unterminated escape sequence (an opening { brace without a closing }) causes the PCS process to crash with an unrecoverable thread error. The lack of input boundary validation suggests potential buffer overflow conditions in the same parsing logic, which could be further developed into a code execution primitive.
Business impact:
The following end-to-end exploitation path was demonstrated by the Efigo Research Team using proof-of-concept tooling. It requires no prior credentials and is executable entirely from the internet against a publicly accessible PCS + WebEA deployment.
model parameter, bypassing all server-side authentication checks.INSERT statements to place a malicious PHP file into the model repository.The entire chain yields a chained CVSSv4 score for Maximum Severity. No user interaction, authentication, or special network position is required.
| Risk Category | Risk Level | Description |
|---|---|---|
| Intellectual Property Theft | Critical | Complete read access to enterprise architecture models, system designs, roadmaps, and proprietary processes stored in EA repositories. |
| Data Integrity & Sabotage | Critical | Full write access enables deletion, corruption, or injection of false data into architectural models, potentially causing downstream design failures. |
| Credential Compromise | Critical | Password hashes for all EA users retrievable without authentication; cracked credentials enable lateral movement across corporate systems. |
| Regulatory & Compliance Exposure | High | Data exfiltration from EA repositories may trigger GDPR, ISO 27001, or sector-specific breach notification obligations. |
| Operational Availability | High | CVE-2026-42100 allows any attacker to crash PCS on demand, disrupting collaborative design workflows and project delivery. |
| Supply Chain Risk | Medium | EA repositories often contain integration specifications and API contracts; compromise may facilitate supply chain attacks on downstream systems. |
| Reputational Damage | Medium | Breach of architectural IP or client data held in EA models may cause significant reputational and commercial harm. |
/SparxCloudLink.sseap without a model query parameter.| Identifier | Reference |
|---|---|
| CVE-2026-42096 | NVD — Broken Access Control in Sparx Pro Cloud Server |
| CVE-2026-42097 | NVD — Authentication Bypass in Sparx Pro Cloud Server |
| CVE-2026-42098 | NVD — Authorization Bypass in Sparx Enterprise Architect |
| CVE-2026-42099 | NVD — Race Condition / RCE in Sparx Pro Cloud Server WebEA |
| CVE-2026-42100 | NVD — Denial of Service in Sparx Pro Cloud Server |
| Technical Writeup | https://sploit.tech/2026/05/19/Sparx-Enterprise-Architect-PCS.html |
This advisory was prepared based on security research conducted by the Efigo Research Team and is provided for informational purposes to assist organizations in assessing their exposure. Organizations should verify applicability to their specific environment and consult qualified security professionals.
.NET Reflection based Server Side Template Injection in WynEnterprise. Vulnerability write-up from our expert Maksym Brzęczek.
W świecie, gdzie cyberzagrożenia stają się coraz bardziej zaawansowane, tradycyjne antywirusy mogą okazać się niewystarczające. Czy XDR to przyszłość ochrony danych? Odkryj, jak nowoczesne podejście do detekcji i reagowania zmienia reguły gry w cyberbezpieczeństwie.
Cyberataki zdarzają się każdej minuty, a nieświadomość może nas sporo kosztować. Poznaj najczęstsze błędy, które narażają bezpieczeństwo Twoich danych. Dowiedz się, jak ich unikać i skutecznie zabezpieczyć swoją cyfrową przestrzeń.
