Cloudcharge.Se

4 CVEs product

Monthly

CVE-2026-27652 HIGH This Week

Session hijacking in Cloudcharge.Se's WebSocket backend allows remote attackers to impersonate legitimate charging stations by exploiting predictable session identifiers and the acceptance of duplicate connections, enabling command interception and station displacement. An attacker can authenticate as other users or trigger denial-of-service conditions by flooding the backend with valid session requests. No patch is currently available.

Authentication Bypass Cloudcharge.Se
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-25114 HIGH This Week

Cloudcharge.Se's WebSocket API fails to implement authentication rate limiting, enabling attackers to launch denial-of-service attacks against charger infrastructure or conduct brute-force credential attacks without restriction. The vulnerability affects remote, unauthenticated attackers and could result in service disruption or unauthorized system access. No patch is currently available.

Authentication Bypass Cloudcharge.Se
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-20781 CRITICAL Act Now

Missing WebSocket authentication in industrial/IoT device management allows unauthenticated attackers to perform station impersonation, data injection, and denial of service. One of several related CVEs affecting the same WebSocket endpoints.

Authentication Bypass Cloudcharge.Se
NVD GitHub
CVSS 3.1
9.4
EPSS
0.1%
CVE-2026-20733 MEDIUM This Month

Cloudcharge.Se charging stations expose authentication credentials through publicly accessible web-based mapping platforms, allowing unauthenticated attackers to discover and potentially intercept sensitive station identifiers. This exposure could enable unauthorized access to charging infrastructure or user accounts without requiring authentication bypass techniques. No patch is currently available for this vulnerability.

Authentication Bypass Cloudcharge.Se
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27652
EPSS 0% CVSS 7.3
HIGH This Week

Session hijacking in Cloudcharge.Se's WebSocket backend allows remote attackers to impersonate legitimate charging stations by exploiting predictable session identifiers and the acceptance of duplicate connections, enabling command interception and station displacement. An attacker can authenticate as other users or trigger denial-of-service conditions by flooding the backend with valid session requests. No patch is currently available.

Authentication Bypass Cloudcharge.Se
NVD GitHub
CVE-2026-25114
EPSS 0% CVSS 7.5
HIGH This Week

Cloudcharge.Se's WebSocket API fails to implement authentication rate limiting, enabling attackers to launch denial-of-service attacks against charger infrastructure or conduct brute-force credential attacks without restriction. The vulnerability affects remote, unauthenticated attackers and could result in service disruption or unauthorized system access. No patch is currently available.

Authentication Bypass Cloudcharge.Se
NVD GitHub
CVE-2026-20781
EPSS 0% CVSS 9.4
CRITICAL Act Now

Missing WebSocket authentication in industrial/IoT device management allows unauthenticated attackers to perform station impersonation, data injection, and denial of service. One of several related CVEs affecting the same WebSocket endpoints.

Authentication Bypass Cloudcharge.Se
NVD GitHub
CVE-2026-20733
EPSS 0% CVSS 6.5
MEDIUM This Month

Cloudcharge.Se charging stations expose authentication credentials through publicly accessible web-based mapping platforms, allowing unauthenticated attackers to discover and potentially intercept sensitive station identifiers. This exposure could enable unauthorized access to charging infrastructure or user accounts without requiring authentication bypass techniques. No patch is currently available for this vulnerability.

Authentication Bypass Cloudcharge.Se
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy