Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66398: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in SignalK signalk-server

0
Critical
VulnerabilityCVE-2025-66398cvecve-2025-66398cwe-78cwe-913
Published: Thu Jan 01 2026 (01/01/2026, 18:00:38 UTC)
Source: CVE Database V5
Vendor/Project: SignalK
Product: signalk-server

Description

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.19.0, an unauthenticated attacker can pollute the internal state (`restoreFilePath`) of the server via the `/skServer/validateBackup` endpoint. This allows the attacker to hijack the administrator's "Restore" functionality to overwrite critical server configuration files (e.g., `security.json`, `package.json`), leading to account takeover and Remote Code Execution (RCE). Version 2.19.0 patches this vulnerability.

AI-Powered Analysis

AILast updated: 01/08/2026, 18:55:15 UTC

Technical Analysis

CVE-2025-66398 is an OS command injection vulnerability identified in the SignalK signalk-server, a server application commonly deployed on central hubs in boats to manage maritime data. The vulnerability exists in versions prior to 2.19.0 and is triggered via the /skServer/validateBackup endpoint, which does not require authentication. An attacker can exploit this endpoint to pollute the internal state variable restoreFilePath. By manipulating this variable, the attacker hijacks the administrator's Restore functionality, enabling overwriting of critical server configuration files such as security.json and package.json. These files are essential for server security and operation. Overwriting them can lead to account takeover by compromising authentication mechanisms and ultimately allows remote code execution (RCE) on the server. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) and CWE-913 (Improper Control of Dynamically-Managed Code Resources). The CVSS v3.1 score is 9.7 (critical), reflecting the vulnerability's network attack vector, no required privileges, low attack complexity, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the severity and ease of exploitation make it a significant threat. The vendor patched this vulnerability in version 2.19.0, and upgrading to this or later versions is strongly recommended.

Potential Impact

For European organizations, particularly those involved in maritime operations such as shipping companies, port authorities, and marine research institutions, this vulnerability poses a severe risk. SignalK servers are used to centralize and manage critical maritime data, including navigation and sensor information. Exploitation could lead to unauthorized access to sensitive operational data, manipulation of vessel control systems, and disruption of maritime operations. The ability to execute remote code could allow attackers to pivot into broader network environments, potentially compromising other critical infrastructure. Given Europe's extensive coastline and reliance on maritime trade, the impact could extend to economic disruption and safety risks. Additionally, compromised systems could be used as a foothold for further attacks against European maritime supply chains and logistics networks.

Mitigation Recommendations

1. Immediate upgrade of all SignalK signalk-server instances to version 2.19.0 or later to apply the official patch. 2. Restrict network access to the /skServer/validateBackup endpoint by implementing firewall rules or network segmentation, allowing only trusted administrative hosts to communicate with the server. 3. Implement strict monitoring and logging of access to the restore functionality and related endpoints to detect anomalous activity. 4. Conduct regular integrity checks on critical configuration files (security.json, package.json) to detect unauthorized modifications. 5. Employ application-layer firewalls or intrusion detection systems capable of detecting command injection patterns targeting the signalk-server. 6. Educate maritime IT staff about the risks and ensure secure configuration management practices are followed. 7. If upgrading immediately is not feasible, consider disabling the Restore functionality temporarily or applying custom input validation to the vulnerable endpoint as a stopgap measure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.363Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6956b95edb813ff03e75250c

Added to database: 1/1/2026, 6:13:50 PM

Last enriched: 1/8/2026, 6:55:15 PM

Last updated: 2/6/2026, 6:53:33 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats