<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Enterprise Architect — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/enterprise-architect/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 10:09:54 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/enterprise-architect/feed.xml" rel="self" type="application/rss+xml"/><item><title>Actively Exploited Vulnerabilities in Sparx Pro Cloud Server and Enterprise Architect</title><link>https://feed.craftedsignal.io/briefs/2026-05-sparx-rce/</link><pubDate>Thu, 21 May 2026 10:09:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sparx-rce/</guid><description>Multiple vulnerabilities, including a critical authentication bypass (CVE-2026-42097), affect Sparx Systems Pro Cloud Server and Enterprise Architect, potentially leading to remote code execution and data compromise; active exploitation is likely given available PoCs.</description><content:encoded><![CDATA[<p>On May 19, 2026, five vulnerabilities were disclosed affecting Sparx Systems Pro Cloud Server (versions up to 6.1 build 167) and Enterprise Architect (versions up to 17.1). These vulnerabilities include a critical authorization bypass (CVE-2026-42097) in Pro Cloud Server, and a high criticality Use of Client-Side Authentication vulnerability (CVE-2026-42098) in Enterprise Architect. Publicly available Proof-of-Concept (PoC) exploits exist for all five vulnerabilities (CVE-2026-42096, CVE-2026-42097, CVE-2026-42098, CVE-2026-42099, CVE-2026-42100), increasing the likelihood of active exploitation. Successful exploitation could lead to unauthorized data access, code execution, and denial-of-service. Defenders should prioritize patching vulnerable systems immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted POST request to the Sparx Pro Cloud Server, including a model name within the binary blob (CVE-2026-42097).</li>
<li>The server improperly validates the request, failing to authenticate the user, and allowing the attacker to bypass authorization.</li>
<li>The attacker leverages the bypass to execute arbitrary SQL queries against the underlying database without proper authentication.</li>
<li>The attacker gains unauthorized access to sensitive data stored within the database, potentially reading, modifying, or deleting information.</li>
<li>In a separate attack, an attacker with low privilege access exploits a race condition (CVE-2026-42099) by creating a malicious PHP file within the repository.</li>
<li>The attacker sends a request to execute the malicious PHP file. Due to delayed transmission response, the file can be executed even after deletion.</li>
<li>The malicious PHP code executes arbitrary commands on the server, potentially installing malware or creating backdoors.</li>
<li>The attacker achieves full system compromise, enabling further malicious activities such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to severe consequences. CVE-2026-42097 allows unauthenticated attackers to execute arbitrary SQL queries, potentially compromising sensitive data. CVE-2026-42098 allows attackers to bypass authentication and impersonate any user, leading to unauthorized modifications. CVE-2026-42099 enables arbitrary PHP code execution. CVE-2026-42100 can cause denial of service. The vulnerabilities collectively impact the confidentiality, integrity, and availability of affected systems. There is no mention of sectors targeted, or specific victim counts, but all users of unpatched Sparx Systems Pro Cloud Server and Enterprise Architect instances are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest patches for Sparx Systems Pro Cloud Server (&lt;= 6.1 build 167) and Enterprise Architect (&lt;= 17.1) to remediate the vulnerabilities detailed in this brief.</li>
<li>Monitor web server logs for suspicious POST requests targeting Sparx Pro Cloud Server with model names in the binary blob, indicative of CVE-2026-42097 exploitation.</li>
<li>Implement the Sigma rule &ldquo;Detect Potential CVE-2026-42097 Exploitation Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Monitor for the creation and execution of unusual PHP files in the Sparx Pro Cloud Server repository directory, potentially indicating CVE-2026-42099 exploitation.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious PHP File Creation in Sparx Pro Cloud Server Repository&rdquo; to identify potentially malicious PHP files being created.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>vulnerability</category><category>rce</category><category>authentication-bypass</category><category>sqli</category></item></channel></rss>