CVE-2025-68271: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in OpenC3 cosmos
CVE-2025-68271 is a critical remote code execution vulnerability in OpenC3 COSMOS versions 5. 0. 0 through 6. 10. 1. The flaw arises from improper neutralization of directives in dynamically evaluated code (eval injection) within the JSON-RPC API. An attacker can send specially crafted JSON-RPC requests that trigger Ruby's eval() function on attacker-controlled input before authorization checks occur, allowing unauthenticated remote code execution. This vulnerability has a CVSS score of 10. 0, indicating maximum severity, and affects embedded systems management environments using OpenC3 COSMOS. The issue is fixed in version 6.
AI Analysis
Technical Summary
OpenC3 COSMOS is a platform designed to send commands and receive data from embedded systems. Versions 5.0.0 through 6.10.1 contain a critical vulnerability (CVE-2025-68271) classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, or eval injection). The vulnerability exists in the JSON-RPC API where certain API calls accept parameters as strings that are parsed using a method called String#convert_to_value. This method executes Ruby's eval() on array-like inputs, which allows execution of arbitrary Ruby code. Critically, the vulnerable code path parses and evaluates the command string before performing authorization checks, meaning an unauthenticated attacker can trigger code execution even though the request ultimately fails authorization. This flaw enables remote code execution (RCE) with no authentication or user interaction required, impacting confidentiality, integrity, and availability of affected systems. The vulnerability has a CVSS 3.1 score of 10.0 (critical), reflecting its ease of exploitation and severe impact. The issue was publicly disclosed in January 2026 and fixed in OpenC3 COSMOS version 6.10.2. No known exploits in the wild have been reported yet, but the severity demands immediate attention.
Potential Impact
For European organizations, the impact of this vulnerability is severe. OpenC3 COSMOS is used to manage embedded systems, which may include critical infrastructure, industrial control systems, aerospace, or defense-related applications. Successful exploitation allows unauthenticated remote attackers to execute arbitrary Ruby code on the server hosting COSMOS, potentially leading to full system compromise, data theft, manipulation of embedded device commands, disruption of operations, and lateral movement within networks. The compromise of embedded system management platforms can have cascading effects on operational technology environments, causing safety risks, financial losses, and reputational damage. Given the criticality and unauthenticated nature of the vulnerability, attackers could rapidly exploit vulnerable systems across Europe, especially in sectors relying heavily on embedded systems management.
Mitigation Recommendations
European organizations should immediately upgrade OpenC3 COSMOS to version 6.10.2 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, organizations should restrict access to the JSON-RPC API to trusted networks only, using network segmentation, firewalls, and VPNs to limit exposure. Implement strict input validation and monitoring on API endpoints to detect anomalous or malicious requests. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) capable of detecting and blocking eval injection patterns. Conduct thorough audits of embedded systems management environments to identify and remediate any unauthorized access or suspicious activity. Additionally, review and tighten authorization logic to ensure no code execution occurs prior to authentication and authorization checks in future development cycles.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Finland, Poland
CVE-2025-68271: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in OpenC3 cosmos
Description
CVE-2025-68271 is a critical remote code execution vulnerability in OpenC3 COSMOS versions 5. 0. 0 through 6. 10. 1. The flaw arises from improper neutralization of directives in dynamically evaluated code (eval injection) within the JSON-RPC API. An attacker can send specially crafted JSON-RPC requests that trigger Ruby's eval() function on attacker-controlled input before authorization checks occur, allowing unauthenticated remote code execution. This vulnerability has a CVSS score of 10. 0, indicating maximum severity, and affects embedded systems management environments using OpenC3 COSMOS. The issue is fixed in version 6.
AI-Powered Analysis
Technical Analysis
OpenC3 COSMOS is a platform designed to send commands and receive data from embedded systems. Versions 5.0.0 through 6.10.1 contain a critical vulnerability (CVE-2025-68271) classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, or eval injection). The vulnerability exists in the JSON-RPC API where certain API calls accept parameters as strings that are parsed using a method called String#convert_to_value. This method executes Ruby's eval() on array-like inputs, which allows execution of arbitrary Ruby code. Critically, the vulnerable code path parses and evaluates the command string before performing authorization checks, meaning an unauthenticated attacker can trigger code execution even though the request ultimately fails authorization. This flaw enables remote code execution (RCE) with no authentication or user interaction required, impacting confidentiality, integrity, and availability of affected systems. The vulnerability has a CVSS 3.1 score of 10.0 (critical), reflecting its ease of exploitation and severe impact. The issue was publicly disclosed in January 2026 and fixed in OpenC3 COSMOS version 6.10.2. No known exploits in the wild have been reported yet, but the severity demands immediate attention.
Potential Impact
For European organizations, the impact of this vulnerability is severe. OpenC3 COSMOS is used to manage embedded systems, which may include critical infrastructure, industrial control systems, aerospace, or defense-related applications. Successful exploitation allows unauthenticated remote attackers to execute arbitrary Ruby code on the server hosting COSMOS, potentially leading to full system compromise, data theft, manipulation of embedded device commands, disruption of operations, and lateral movement within networks. The compromise of embedded system management platforms can have cascading effects on operational technology environments, causing safety risks, financial losses, and reputational damage. Given the criticality and unauthenticated nature of the vulnerability, attackers could rapidly exploit vulnerable systems across Europe, especially in sectors relying heavily on embedded systems management.
Mitigation Recommendations
European organizations should immediately upgrade OpenC3 COSMOS to version 6.10.2 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, organizations should restrict access to the JSON-RPC API to trusted networks only, using network segmentation, firewalls, and VPNs to limit exposure. Implement strict input validation and monitoring on API endpoints to detect anomalous or malicious requests. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) capable of detecting and blocking eval injection patterns. Conduct thorough audits of embedded systems management environments to identify and remediate any unauthorized access or suspicious activity. Additionally, review and tighten authorization logic to ensure no code execution occurs prior to authentication and authorization checks in future development cycles.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-16T14:05:31.364Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69669561a60475309fa56540
Added to database: 1/13/2026, 6:56:33 PM
Last enriched: 1/21/2026, 2:57:59 AM
Last updated: 2/7/2026, 8:58:54 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.