Signal K Server

8 CVEs product

Monthly

CVE-2026-25228 MEDIUM POC PATCH This Month

Signal K Server versions prior to 2.20.3 on Windows contain a path traversal vulnerability in the applicationData API that allows authenticated users to read, write, and list arbitrary files by bypassing directory validation using backslashes. The vulnerability exists because the validateAppId() function only blocks forward slashes, allowing attackers to escape the intended applicationData directory through Windows path semantics. Public exploit code exists for this medium-severity flaw, and a patch is available in version 2.20.3.

Windows Path Traversal Signal K Server
NVD GitHub
CVSS 3.1
5.0
EPSS
0.0%
CVE-2026-23515 CRITICAL POC PATCH Act Now

Command injection in Signal K Server (maritime navigation) before 1.5.0 allows authenticated users to execute OS commands. EPSS 4.96% with PoC and patch available.

Command Injection Signal K Server
NVD GitHub
CVSS 3.1
9.9
EPSS
5.0%
CVE-2025-69203 MEDIUM POC PATCH This Month

Signal K Server is a server application that runs on a central hub in a boat. [CVSS 6.3 MEDIUM]

Information Disclosure Signal K Server
NVD GitHub
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-68620 CRITICAL POC PATCH Act Now

Signal K Server before 2.19.0 exposes two features that chain together to steal JWT tokens without authentication: WebSocket-based request enumeration plus unauthenticated polling of access request status. An attacker can hijack admin sessions remotely. PoC available.

Authentication Bypass Signal K Server
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-68619 HIGH POC PATCH This Week

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the appstore interface allow administrators to install npm packages through a REST API endpoint. [CVSS 7.2 HIGH]

Node.js Github Signal K Server RCE
NVD GitHub
CVSS 3.1
7.2
EPSS
0.1%
CVE-2025-68273 MEDIUM POC PATCH This Month

Signal K Server is a server application that runs on a central hub in a boat. [CVSS 5.3 MEDIUM]

Information Disclosure Signal K Server
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-68272 HIGH POC PATCH This Week

Signal K Server is a server application that runs on a central hub in a boat. A Denial of Service (DoS) vulnerability in versions prior to 2.19.0 allows an unauthenticated attacker to crash the SignalK Server by flooding the access request endpoint (`/signalk/v1/access/requests`). [CVSS 7.5 HIGH]

Denial Of Service Signal K Server
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-66398 CRITICAL POC PATCH Act Now

Signal K Server (for boats) before 2.19.0 allows unauthenticated attackers to hijack the backup restore function by polluting the internal restoreFilePath state via the /validateBackup endpoint. This enables overwriting security.json and other critical files to achieve OS command injection.

RCE Signal K Server
NVD GitHub
CVSS 3.1
9.6
EPSS
0.1%
CVE-2026-25228
EPSS 0% CVSS 5.0
MEDIUM POC PATCH This Month

Signal K Server versions prior to 2.20.3 on Windows contain a path traversal vulnerability in the applicationData API that allows authenticated users to read, write, and list arbitrary files by bypassing directory validation using backslashes. The vulnerability exists because the validateAppId() function only blocks forward slashes, allowing attackers to escape the intended applicationData directory through Windows path semantics. Public exploit code exists for this medium-severity flaw, and a patch is available in version 2.20.3.

Windows Path Traversal Signal K Server
NVD GitHub
CVE-2026-23515
EPSS 5% CVSS 9.9
CRITICAL POC PATCH Act Now

Command injection in Signal K Server (maritime navigation) before 1.5.0 allows authenticated users to execute OS commands. EPSS 4.96% with PoC and patch available.

Command Injection Signal K Server
NVD GitHub
CVE-2025-69203
EPSS 0% CVSS 6.3
MEDIUM POC PATCH This Month

Signal K Server is a server application that runs on a central hub in a boat. [CVSS 6.3 MEDIUM]

Information Disclosure Signal K Server
NVD GitHub
CVE-2025-68620
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Signal K Server before 2.19.0 exposes two features that chain together to steal JWT tokens without authentication: WebSocket-based request enumeration plus unauthenticated polling of access request status. An attacker can hijack admin sessions remotely. PoC available.

Authentication Bypass Signal K Server
NVD GitHub
CVE-2025-68619
EPSS 0% CVSS 7.2
HIGH POC PATCH This Week

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the appstore interface allow administrators to install npm packages through a REST API endpoint. [CVSS 7.2 HIGH]

Node.js Github Signal K Server +1
NVD GitHub
CVE-2025-68273
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

Signal K Server is a server application that runs on a central hub in a boat. [CVSS 5.3 MEDIUM]

Information Disclosure Signal K Server
NVD GitHub
CVE-2025-68272
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Signal K Server is a server application that runs on a central hub in a boat. A Denial of Service (DoS) vulnerability in versions prior to 2.19.0 allows an unauthenticated attacker to crash the SignalK Server by flooding the access request endpoint (`/signalk/v1/access/requests`). [CVSS 7.5 HIGH]

Denial Of Service Signal K Server
NVD GitHub
CVE-2025-66398
EPSS 0% CVSS 9.6
CRITICAL POC PATCH Act Now

Signal K Server (for boats) before 2.19.0 allows unauthenticated attackers to hijack the backup restore function by polluting the internal restoreFilePath state via the /validateBackup endpoint. This enables overwriting security.json and other critical files to achieve OS command injection.

RCE Signal K Server
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy