Back to list

Geyser Vulnerable to Server-Side Request Forgery (SSRF) via Player Head Texture URL in Geyser — CVE-2026-42188

GitHub · GitHub · CVE-2026-42188

ID
CVE-2026-42188
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
low
CVSS
2.4
EPSS
0.00023

Summary

### Summary A server-side request forgery (SSRF) vulnerability exists in Geyser’s handling of Bedrock player head texture data. By supplying a crafted Base64-encoded skin texture URL via the /give command, an attacker can cause the Minecraft server to issue arbitrary HTTP GET requests to attacker-controlled or internal endpoints. This occurs server-side, without proper URL validation, and can be triggered by a…

Product

maven: org.geysermc.geyser:core

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories