Description
An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5.2.1 (5.2.1 is used in guardsix 7.9.0.0). A logic flaw allowed stored database credentials to be reused after modification of the target Host, IP address, or Port. When editing an existing Enrichment Source, previously stored credentials were retained even if the connection endpoint was changed. An authenticated Operator user could redirect the database connection to unintended internal systems, resulting in SSRF and potential misuse of valid stored credentials.
Published: 2026-04-22
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery with credential reuse
Action: Apply Patch
AI Analysis

Impact

A logic flaw in Guardsix (formerly Logpoint) ODBC Enrichment Plugins allowed stored database credentials to be reused after the target Host, IP address, or Port was modified. When an authenticated Operator edited an existing Enrichment Source, previously stored credentials were retained even though the connection endpoint changed, enabling the Operator to redirect the database connection to unintended internal systems. This flaw facilitates Server‑Side Request Forgery and can lead to misuse of valid stored credentials against internal services.

Affected Systems

Guardsix ODBC Enrichment Plugins versions prior to 5.2.1 are vulnerable. Guardsix 7.9.0.0 uses plugin version 5.2.1, which includes the fix, so systems running that release are not affected.

Risk and Exploitability

The vulnerability requires an authenticated Operator and leverages the web interface to modify an Enrichment Source. Exploitation would allow the attacker to reach protected internal network hosts and use valid credentials, potentially leading to data exfiltration or lateral movement. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, but the lack of a publicly known exploit does not eliminate the risk. The CVSS score of 8.5 indicates a high severity, underscoring the potential for significant internal compromise when the Operator has sufficient permissions.

Generated by OpenCVE AI on April 27, 2026 at 19:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Guardsix ODBC Enrichment Plugins to version 5.2.1 or later (used in Guardsix 7.9.0.0).
  • If an upgrade is not immediately possible, restrict the Operator role so that editing Enrichment Source target host details is disabled or limited to non‑sensitive internal services.
  • Monitor operational logs for changes to Enrichment Source host, IP, or port and investigate any suspicious internal connections.

Generated by OpenCVE AI on April 27, 2026 at 19:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Guardsix
Guardsix odbc Enrichment Plugins
Vendors & Products Guardsix
Guardsix odbc Enrichment Plugins

Mon, 27 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Title Logic Flaw in ODBC Enrichment Plugins Allows SSRF via Reused Credentials

Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5.2.1 (5.2.1 is used in guardsix 7.9.0.0). A logic flaw allowed stored database credentials to be reused after modification of the target Host, IP address, or Port. When editing an existing Enrichment Source, previously stored credentials were retained even if the connection endpoint was changed. An authenticated Operator user could redirect the database connection to unintended internal systems, resulting in SSRF and potential misuse of valid stored credentials.
References

Subscriptions

Guardsix Odbc Enrichment Plugins
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T15:21:32.153Z

Reserved: 2026-04-03T00:00:00.000Z

Link: CVE-2026-35548

cve-icon Vulnrichment

Updated: 2026-04-22T15:07:23.969Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T15:16:16.100

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-35548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T20:21:10Z

Weaknesses