An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5.2.1 (5.2.1 is used in guardsix 7.9.0.0). A logic flaw allowed stored database credentials to be reused after modification of the target Host, IP address, or Port. When editing an existing Enrichment Source, previously stored credentials were retained even if the connection endpoint was changed. An authenticated Operator user could redirect the database connection to unintended internal systems, resulting in SSRF and potential misuse of valid stored credentials.
History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Guardsix
Guardsix odbc Enrichment Plugins
Vendors & Products Guardsix
Guardsix odbc Enrichment Plugins

Mon, 27 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Title Logic Flaw in ODBC Enrichment Plugins Allows SSRF via Reused Credentials

Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5.2.1 (5.2.1 is used in guardsix 7.9.0.0). A logic flaw allowed stored database credentials to be reused after modification of the target Host, IP address, or Port. When editing an existing Enrichment Source, previously stored credentials were retained even if the connection endpoint was changed. An authenticated Operator user could redirect the database connection to unintended internal systems, resulting in SSRF and potential misuse of valid stored credentials.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T15:21:32.153Z

Reserved: 2026-04-03T00:00:00.000Z

Link: CVE-2026-35548

cve-icon Vulnrichment

Updated: 2026-04-22T15:07:23.969Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T15:16:16.100

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-35548

cve-icon Redhat

No data.