Vulnerability Description
Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the set-system-time plugin is enabled. Unauthenticated users can also exploit this vulnerability if security is disabled on the Signal K server. This occurs due to unsafe construction of shell commands when processing navigation.datetime values received via WebSocket delta messages. This vulnerability is fixed in 1.5.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Signalk | Signal K Server | < 1.5.0 |
Related Weaknesses (CWE)
References
- https://github.com/SignalK/set-system-time/commit/75b11eae2de528bf89ede3fb1f7ed0Patch
- https://github.com/SignalK/signalk-server/security/advisories/GHSA-p8gp-2w28-mhwVendor AdvisoryExploit
FAQ
What is CVE-2026-23515?
CVE-2026-23515 is a vulnerability with a CVSS score of 9.9 (CRITICAL). Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary s...
How severe is CVE-2026-23515?
CVE-2026-23515 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-23515?
Check the references section above for vendor advisories and patch information. Affected products include: Signalk Signal K Server.