Impact
Sparx Pro Cloud Server permits low‑privileged users to execute arbitrary SQL queries due to missing access‑control checks on database communication. An attacker can read sensitive data, alter records, or delete information, thereby compromising confidentiality and integrity. The weakness maps to CWE‑863 and carries a CVSS score of 8.7, indicating a high‑severity vulnerability that can be used to undermine the application’s data store.
Affected Systems
Sparx Systems Pro Cloud Server. Versions 6.1 (build 167) and earlier were tested and confirmed vulnerable; later releases have not been evaluated and may also be affected.
Risk and Exploitability
The CVSS score of 8.7 signifies a large impact window. No EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector involves standard communication channels of the application, such as HTTP/HTTPS or any other client‑server interface that transmits SQL statements to the database. An attacker with low privileges can exploit the missing permission checks to execute any SQL command in the database user context.
OpenCVE Enrichment