Sparx Enterprise Architect software has a security feature that limits user's actions to those specified in the role. An authenticated attacker can modify the Enterprise Architect client behavior (e.g. using a debugger) and log in as any other user or administrator - then it is possible to do every possible change to the repository.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 17.1 and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

Project Subscriptions

Vendors Products
Sparxsystems Subscribe
Enterprise Architect Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Sparxsystems
Sparxsystems enterprise Architect
Vendors & Products Sparxsystems
Sparxsystems enterprise Architect

Tue, 19 May 2026 13:45:00 +0000

Type Values Removed Values Added
Description Sparx Enterprise Architect software has a security feature that limits user's actions to those specified in the role. An authenticated attacker can modify the Enterprise Architect client behavior (e.g. using a debugger) and log in as any other user or administrator - then it is possible to do every possible change to the repository. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 17.1 and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Title Authorization Bypass in Sparx Enterprise Architect
Weaknesses CWE-603
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-05-19T15:27:32.916Z

Reserved: 2026-04-24T12:15:00.858Z

Link: CVE-2026-42098

cve-icon Vulnrichment

Updated: 2026-05-19T15:27:30.343Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T14:16:42.417

Modified: 2026-05-19T14:45:59.807

Link: CVE-2026-42098

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T14:45:07Z

Weaknesses