Description
Sparx Pro Cloud Server is vulnerable to a Race Condition in the /data_api/dl_internal_artifact.php endpoint. The application downloads the properties of the object pointed by guid parameter and saves loaded content in current location (__DIR__) under the specified name. An attacker with repository access can control both the filename and file contents, allowing the creation of a malicious PHP file in a current directory. Although the file is deleted after processing, a race condition exists: if the response transmission is delayed (e.g., via a large file or slow client connection), the file remains accessible. During this window, the attacker can issue a second request to execute the malicious PHP file, resulting in remote code execution.








The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Published: 2026-05-19
Score: 7.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A race condition in the /data_api/dl_internal_artifact.php endpoint of Sparx Pro Cloud Server allows an attacker with repository access to download an object, save it as a PHP file, and then execute it before the temporary file is deleted. Because the file persists while the response is still being transmitted, the attacker can issue a second request to trigger execution. This results in remote code execution on the server with the privileges of the web application. The weakness is a classic race condition (CWE-362).

Affected Systems

Sparx Systems Pro Cloud Server, specifically version 6.1 build 167 and all earlier builds that were tested and found vulnerable. Versions beyond 6.1 build 167 have not been tested and may also be vulnerable, but no confirmation is available.

Risk and Exploitability

The CVSS score of 7.7 indicates a high severity vulnerability. No EPSS score is available, and the flaw is not yet listed in CISA KEV, so current exploitation activity is unknown. The attacker must be able to send web requests to the vulnerable endpoint and have repository access permissions. By delivering a large or slow file, the attacker can extend the race window and then immediately execute the malicious PHP script. This makes the attack relatively easy once the necessary permissions are in place.

Generated by OpenCVE AI on May 19, 2026 at 14:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a fixed version of Pro Cloud Server or apply any vendor-provided patch.
  • Restrict repository access so that only trusted, authorized users can invoke the /data_api/dl_internal_artifact.php endpoint.
  • Configure strict timeouts on file uploads/downloads to minimize the window where the temporary file remains accessible; if possible, disable the endpoint or force immediate deletion of uploaded content.

Generated by OpenCVE AI on May 19, 2026 at 14:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 May 2026 13:45:00 +0000

Type Values Removed Values Added
Description Sparx Pro Cloud Server is vulnerable to a Race Condition in the /data_api/dl_internal_artifact.php endpoint. The application downloads the properties of the object pointed by guid parameter and saves loaded content in current location (__DIR__) under the specified name. An attacker with repository access can control both the filename and file contents, allowing the creation of a malicious PHP file in a current directory. Although the file is deleted after processing, a race condition exists: if the response transmission is delayed (e.g., via a large file or slow client connection), the file remains accessible. During this window, the attacker can issue a second request to execute the malicious PHP file, resulting in remote code execution. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Title Race Condition in Sparx Pro Cloud Server
Weaknesses CWE-362
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-05-19T15:26:27.124Z

Reserved: 2026-04-24T12:15:00.858Z

Link: CVE-2026-42099

cve-icon Vulnrichment

Updated: 2026-05-19T15:26:22.827Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T14:16:42.630

Modified: 2026-05-19T14:45:59.807

Link: CVE-2026-42099

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T14:45:07Z

Weaknesses