CVE-2025-66398: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in SignalK signalk-server
Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.19.0, an unauthenticated attacker can pollute the internal state (`restoreFilePath`) of the server via the `/skServer/validateBackup` endpoint. This allows the attacker to hijack the administrator's "Restore" functionality to overwrite critical server configuration files (e.g., `security.json`, `package.json`), leading to account takeover and Remote Code Execution (RCE). Version 2.19.0 patches this vulnerability.
AI Analysis
Technical Summary
CVE-2025-66398 is an OS command injection vulnerability identified in the SignalK signalk-server, a server application commonly deployed on central hubs in boats to manage maritime data. The vulnerability exists in versions prior to 2.19.0 and is triggered via the /skServer/validateBackup endpoint, which does not require authentication. An attacker can exploit this endpoint to pollute the internal state variable restoreFilePath. By manipulating this variable, the attacker hijacks the administrator's Restore functionality, enabling overwriting of critical server configuration files such as security.json and package.json. These files are essential for server security and operation. Overwriting them can lead to account takeover by compromising authentication mechanisms and ultimately allows remote code execution (RCE) on the server. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) and CWE-913 (Improper Control of Dynamically-Managed Code Resources). The CVSS v3.1 score is 9.7 (critical), reflecting the vulnerability's network attack vector, no required privileges, low attack complexity, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the severity and ease of exploitation make it a significant threat. The vendor patched this vulnerability in version 2.19.0, and upgrading to this or later versions is strongly recommended.
Potential Impact
For European organizations, particularly those involved in maritime operations such as shipping companies, port authorities, and marine research institutions, this vulnerability poses a severe risk. SignalK servers are used to centralize and manage critical maritime data, including navigation and sensor information. Exploitation could lead to unauthorized access to sensitive operational data, manipulation of vessel control systems, and disruption of maritime operations. The ability to execute remote code could allow attackers to pivot into broader network environments, potentially compromising other critical infrastructure. Given Europe's extensive coastline and reliance on maritime trade, the impact could extend to economic disruption and safety risks. Additionally, compromised systems could be used as a foothold for further attacks against European maritime supply chains and logistics networks.
Mitigation Recommendations
1. Immediate upgrade of all SignalK signalk-server instances to version 2.19.0 or later to apply the official patch. 2. Restrict network access to the /skServer/validateBackup endpoint by implementing firewall rules or network segmentation, allowing only trusted administrative hosts to communicate with the server. 3. Implement strict monitoring and logging of access to the restore functionality and related endpoints to detect anomalous activity. 4. Conduct regular integrity checks on critical configuration files (security.json, package.json) to detect unauthorized modifications. 5. Employ application-layer firewalls or intrusion detection systems capable of detecting command injection patterns targeting the signalk-server. 6. Educate maritime IT staff about the risks and ensure secure configuration management practices are followed. 7. If upgrading immediately is not feasible, consider disabling the Restore functionality temporarily or applying custom input validation to the vulnerable endpoint as a stopgap measure.
Affected Countries
United Kingdom, Norway, Netherlands, Germany, France, Italy, Spain, Greece
CVE-2025-66398: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in SignalK signalk-server
Description
Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.19.0, an unauthenticated attacker can pollute the internal state (`restoreFilePath`) of the server via the `/skServer/validateBackup` endpoint. This allows the attacker to hijack the administrator's "Restore" functionality to overwrite critical server configuration files (e.g., `security.json`, `package.json`), leading to account takeover and Remote Code Execution (RCE). Version 2.19.0 patches this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2025-66398 is an OS command injection vulnerability identified in the SignalK signalk-server, a server application commonly deployed on central hubs in boats to manage maritime data. The vulnerability exists in versions prior to 2.19.0 and is triggered via the /skServer/validateBackup endpoint, which does not require authentication. An attacker can exploit this endpoint to pollute the internal state variable restoreFilePath. By manipulating this variable, the attacker hijacks the administrator's Restore functionality, enabling overwriting of critical server configuration files such as security.json and package.json. These files are essential for server security and operation. Overwriting them can lead to account takeover by compromising authentication mechanisms and ultimately allows remote code execution (RCE) on the server. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) and CWE-913 (Improper Control of Dynamically-Managed Code Resources). The CVSS v3.1 score is 9.7 (critical), reflecting the vulnerability's network attack vector, no required privileges, low attack complexity, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the severity and ease of exploitation make it a significant threat. The vendor patched this vulnerability in version 2.19.0, and upgrading to this or later versions is strongly recommended.
Potential Impact
For European organizations, particularly those involved in maritime operations such as shipping companies, port authorities, and marine research institutions, this vulnerability poses a severe risk. SignalK servers are used to centralize and manage critical maritime data, including navigation and sensor information. Exploitation could lead to unauthorized access to sensitive operational data, manipulation of vessel control systems, and disruption of maritime operations. The ability to execute remote code could allow attackers to pivot into broader network environments, potentially compromising other critical infrastructure. Given Europe's extensive coastline and reliance on maritime trade, the impact could extend to economic disruption and safety risks. Additionally, compromised systems could be used as a foothold for further attacks against European maritime supply chains and logistics networks.
Mitigation Recommendations
1. Immediate upgrade of all SignalK signalk-server instances to version 2.19.0 or later to apply the official patch. 2. Restrict network access to the /skServer/validateBackup endpoint by implementing firewall rules or network segmentation, allowing only trusted administrative hosts to communicate with the server. 3. Implement strict monitoring and logging of access to the restore functionality and related endpoints to detect anomalous activity. 4. Conduct regular integrity checks on critical configuration files (security.json, package.json) to detect unauthorized modifications. 5. Employ application-layer firewalls or intrusion detection systems capable of detecting command injection patterns targeting the signalk-server. 6. Educate maritime IT staff about the risks and ensure secure configuration management practices are followed. 7. If upgrading immediately is not feasible, consider disabling the Restore functionality temporarily or applying custom input validation to the vulnerable endpoint as a stopgap measure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-28T23:33:56.363Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6956b95edb813ff03e75250c
Added to database: 1/1/2026, 6:13:50 PM
Last enriched: 1/8/2026, 6:55:15 PM
Last updated: 2/6/2026, 6:53:33 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-8149: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
MediumCVE-2024-51962: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Esri ArcGIS Server
HighCVE-2024-51954: CWE-284: Improper Access Control in Esri ArcGIS Server
HighCVE-2024-25699: CWE-287 Improper Authentication in Esri Portal for ArcGIS
HighCVE-2026-1998: Memory Corruption in micropython
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.