Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-42099: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Sparx Systems Pro Cloud Server

0
High
VulnerabilityCVE-2026-42099cvecve-2026-42099cwe-362
Published: Tue May 19 2026 (05/19/2026, 12:59:38 UTC)
Source: CVE Database V5
Vendor/Project: Sparx Systems
Product: Pro Cloud Server

Description

Sparx Pro Cloud Server is vulnerable to a Race Condition in the /data_api/dl_internal_artifact.php endpoint. The application downloads the properties of the object pointed by guid parameter and saves loaded content in current location (__DIR__) under the specified name. An attacker with repository access can control both the filename and file contents, allowing the creation of a malicious PHP file in a current directory. Although the file is deleted after processing, a race condition exists: if the response transmission is delayed (e.g., via a large file or slow client connection), the file remains accessible. During this window, the attacker can issue a second request to execute the malicious PHP file, resulting in remote code execution. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/19/2026, 13:51:51 UTC

Technical Analysis

This vulnerability involves a race condition (CWE-362) in Sparx Systems Pro Cloud Server's /data_api/dl_internal_artifact.php endpoint. The server downloads object properties based on a guid parameter and saves the content as a file in the current directory. An attacker controlling filename and content can create a malicious PHP file. Due to improper synchronization, if response transmission is slow, the file remains accessible temporarily, enabling a second request to execute it, resulting in remote code execution. The vendor was notified but did not disclose affected versions beyond confirming vulnerability in version 6.1 (build 167) and earlier.

Potential Impact

Successful exploitation allows an attacker with repository access to achieve remote code execution on the server by exploiting a race condition that leaves a malicious PHP file accessible temporarily. This can lead to full compromise of the affected system. The CVSS 4.0 score is 7.7 (high severity), reflecting network attack vector, high impact on confidentiality, integrity, and availability, and requiring low privileges but partial user interaction.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or workaround has been published, users should restrict repository access to trusted users only and monitor for unusual activity. Avoid using affected versions (6.1 build 167 and below) in exposed environments until a patch or official mitigation is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2026-04-24T12:15:00.858Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 6a0c6776ec166c07b0a98c31

Added to database: 5/19/2026, 1:36:54 PM

Last enriched: 5/19/2026, 1:51:51 PM

Last updated: 5/20/2026, 1:33:35 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses