Geyser Vulnerable to Server-Side Request Forgery (SSRF) via Player Head Texture URL in Geyser — CVE-2026-42188
GitHub · GitHub · CVE-2026-42188
ID
CVE-2026-42188
CVE-2026-42188
Date
Updated
Activity
Source
GitHub
GitHub
Vendor
GitHub
GitHub
Threat
low
low
CVSS
2.4
2.4
EPSS
0.00023
0.00023
Summary
### Summary A server-side request forgery (SSRF) vulnerability exists in Geyser’s handling of Bedrock player head texture data. By supplying a crafted Base64-encoded skin texture URL via the /give command, an attacker can cause the Minecraft server to issue arbitrary HTTP GET requests to attacker-controlled or internal endpoints. This occurs server-side, without proper URL validation, and can be triggered by a…
Product
maven: org.geysermc.geyser:core
What to do
General, cautious steps (verify details in the official source):
- Review exposure and plan remediation based on risk and environment.
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.