Description
Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Prior to 2.9.3, a server-side request forgery (SSRF) vulnerability exists in Geyser’s handling of Bedrock player head texture data. By supplying a crafted Base64-encoded skin texture URL via the /give command, an attacker can cause the Minecraft server to issue arbitrary HTTP GET requests to attacker-controlled or internal endpoints. This occurs server-side, without proper URL validation, and can be triggered by a Bedrock client. This vulnerability is fixed in 2.9.3.
Published: 2026-05-11
Score: 2.4 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A server‑side request forgery vulnerability exists in Geyser versions prior to 2.9.3, triggered by a crafted Base64‑encoded skin texture URL supplied through the /give command. The vulnerability causes the Minecraft server to perform arbitrary HTTP GET requests to URLs that the attacker controls or that are internal to the server network. While it does not provide direct code execution, it can be used for reconnaissance, internal network probing, or exfiltration of data.

Affected Systems

The affected product is GeyserMC Geyser, the bridge between Minecraft Bedrock and Java editions. All releases prior to 2.9.3 are susceptible. The vulnerability is exploitable on servers that allow Bedrock clients to use the /give command to set player head textures.

Risk and Exploitability

The CVSS score of 2.4 classifies the issue as low severity. No EPSS score is reported, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a Bedrock client that can run the /give command with a malicious texture URL. Although exploitation potential is limited compared to higher‑impact flaws, the SSRF could reach sensitive internal endpoints if the server network is improperly segmented.

Generated by OpenCVE AI on May 11, 2026 at 23:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Geyser to version 2.9.3 or later to remove the vulnerability.
  • Restrict the /give command to trusted users or disable it entirely for Bedrock clients.
  • Configure network controls or firewalls to prevent outbound HTTP traffic from the Minecraft server to internal or sensitive endpoints.

Generated by OpenCVE AI on May 11, 2026 at 23:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xcfg-fcr5-gw9r Geyser Vulnerable to Server-Side Request Forgery (SSRF) via Player Head Texture URL in Geyser
History

Tue, 12 May 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Geysermc
Geysermc geyser
Vendors & Products Geysermc
Geysermc geyser

Mon, 11 May 2026 22:00:00 +0000

Type Values Removed Values Added
Description Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Prior to 2.9.3, a server-side request forgery (SSRF) vulnerability exists in Geyser’s handling of Bedrock player head texture data. By supplying a crafted Base64-encoded skin texture URL via the /give command, an attacker can cause the Minecraft server to issue arbitrary HTTP GET requests to attacker-controlled or internal endpoints. This occurs server-side, without proper URL validation, and can be triggered by a Bedrock client. This vulnerability is fixed in 2.9.3.
Title Geyser: Server-Side Request Forgery (SSRF) via Player Head Texture URL
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-11T21:25:27.303Z

Reserved: 2026-04-25T01:53:21.583Z

Link: CVE-2026-42188

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-11T22:22:11.277

Modified: 2026-05-11T22:22:11.277

Link: CVE-2026-42188

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T23:45:03Z

Weaknesses