Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68271: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in OpenC3 cosmos

0
Critical
VulnerabilityCVE-2025-68271cvecve-2025-68271cwe-95
Published: Tue Jan 13 2026 (01/13/2026, 18:32:21 UTC)
Source: CVE Database V5
Vendor/Project: OpenC3
Product: cosmos

Description

CVE-2025-68271 is a critical remote code execution vulnerability in OpenC3 COSMOS versions 5. 0. 0 through 6. 10. 1. The flaw arises from improper neutralization of directives in dynamically evaluated code (eval injection) within the JSON-RPC API. An attacker can send specially crafted JSON-RPC requests that trigger Ruby's eval() function on attacker-controlled input before authorization checks occur, allowing unauthenticated remote code execution. This vulnerability has a CVSS score of 10. 0, indicating maximum severity, and affects embedded systems management environments using OpenC3 COSMOS. The issue is fixed in version 6.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:57:59 UTC

Technical Analysis

OpenC3 COSMOS is a platform designed to send commands and receive data from embedded systems. Versions 5.0.0 through 6.10.1 contain a critical vulnerability (CVE-2025-68271) classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, or eval injection). The vulnerability exists in the JSON-RPC API where certain API calls accept parameters as strings that are parsed using a method called String#convert_to_value. This method executes Ruby's eval() on array-like inputs, which allows execution of arbitrary Ruby code. Critically, the vulnerable code path parses and evaluates the command string before performing authorization checks, meaning an unauthenticated attacker can trigger code execution even though the request ultimately fails authorization. This flaw enables remote code execution (RCE) with no authentication or user interaction required, impacting confidentiality, integrity, and availability of affected systems. The vulnerability has a CVSS 3.1 score of 10.0 (critical), reflecting its ease of exploitation and severe impact. The issue was publicly disclosed in January 2026 and fixed in OpenC3 COSMOS version 6.10.2. No known exploits in the wild have been reported yet, but the severity demands immediate attention.

Potential Impact

For European organizations, the impact of this vulnerability is severe. OpenC3 COSMOS is used to manage embedded systems, which may include critical infrastructure, industrial control systems, aerospace, or defense-related applications. Successful exploitation allows unauthenticated remote attackers to execute arbitrary Ruby code on the server hosting COSMOS, potentially leading to full system compromise, data theft, manipulation of embedded device commands, disruption of operations, and lateral movement within networks. The compromise of embedded system management platforms can have cascading effects on operational technology environments, causing safety risks, financial losses, and reputational damage. Given the criticality and unauthenticated nature of the vulnerability, attackers could rapidly exploit vulnerable systems across Europe, especially in sectors relying heavily on embedded systems management.

Mitigation Recommendations

European organizations should immediately upgrade OpenC3 COSMOS to version 6.10.2 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, organizations should restrict access to the JSON-RPC API to trusted networks only, using network segmentation, firewalls, and VPNs to limit exposure. Implement strict input validation and monitoring on API endpoints to detect anomalous or malicious requests. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) capable of detecting and blocking eval injection patterns. Conduct thorough audits of embedded systems management environments to identify and remediate any unauthorized access or suspicious activity. Additionally, review and tighten authorization logic to ensure no code execution occurs prior to authentication and authorization checks in future development cycles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T14:05:31.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69669561a60475309fa56540

Added to database: 1/13/2026, 6:56:33 PM

Last enriched: 1/21/2026, 2:57:59 AM

Last updated: 2/7/2026, 8:58:54 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats