Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68271: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in OpenC3 cosmos

0
Critical
VulnerabilityCVE-2025-68271cvecve-2025-68271cwe-95
Published: Tue Jan 13 2026 (01/13/2026, 18:32:21 UTC)
Source: CVE Database V5
Vendor/Project: OpenC3
Product: cosmos

Description

OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. From 5.0.0 to 6.10.1, OpenC3 COSMOS contains a critical remote code execution vulnerability reachable through the JSON-RPC API. When a JSON-RPC request uses the string form of certain APIs, attacker-controlled parameter text is parsed into values using String#convert_to_value. For array-like inputs, convert_to_value executes eval(). Because the cmd code path parses the command string before calling authorize(), an unauthenticated attacker can trigger Ruby code execution even though the request ultimately fails authorization (401). This vulnerability is fixed in 6.10.2.

AI-Powered Analysis

AILast updated: 01/13/2026, 19:12:38 UTC

Technical Analysis

OpenC3 COSMOS is a command and control framework used to send commands and receive data from embedded systems. Versions 5.0.0 to 6.10.1 contain a critical vulnerability (CVE-2025-68271) classified as CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code, commonly known as eval injection. The vulnerability exists in the JSON-RPC API where certain API calls accept parameters as strings that are parsed using a method called String#convert_to_value. For inputs resembling arrays, this method executes Ruby's eval() function on attacker-controlled input. Critically, the command string is parsed and eval() executed before the authorization check occurs, allowing unauthenticated attackers to execute arbitrary Ruby code remotely. Although the request ultimately fails authorization with a 401 response, the code execution occurs prior to this check, enabling full remote code execution (RCE). This can lead to complete system compromise including data theft, system manipulation, or denial of service. The vulnerability is fixed in OpenC3 COSMOS version 6.10.2. The CVSS v3.1 base score is 10.0, reflecting network attack vector, no required privileges or user interaction, and a scope change with high impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations using OpenC3 COSMOS to manage embedded systems, this vulnerability presents a critical risk. Exploitation can lead to full remote code execution without authentication, allowing attackers to take control of embedded devices, exfiltrate sensitive data, disrupt operations, or pivot within networks. Given the use of embedded systems in critical infrastructure, manufacturing, aerospace, and defense sectors prevalent in Europe, the impact could be severe including operational downtime, intellectual property theft, and safety risks. The vulnerability’s ease of exploitation and high severity make it attractive for threat actors, including nation-state adversaries targeting strategic European industries. The potential for widespread disruption and compromise of sensitive systems necessitates immediate remediation to protect confidentiality, integrity, and availability of critical assets.

Mitigation Recommendations

European organizations should urgently upgrade OpenC3 COSMOS to version 6.10.2 or later, where this vulnerability is patched. Until upgrade is possible, organizations should restrict access to the JSON-RPC API to trusted networks only, using network segmentation and firewall rules to block untrusted external access. Implement strict monitoring and logging of JSON-RPC API calls to detect anomalous or suspicious activity indicative of exploitation attempts. Employ application-layer firewalls or runtime application self-protection (RASP) solutions that can detect and block eval injection patterns. Conduct thorough code audits and penetration testing on custom integrations with OpenC3 COSMOS to identify and remediate similar unsafe eval usage. Finally, ensure incident response plans are updated to address potential exploitation scenarios involving embedded system compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T14:05:31.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69669561a60475309fa56540

Added to database: 1/13/2026, 6:56:33 PM

Last enriched: 1/13/2026, 7:12:38 PM

Last updated: 1/14/2026, 1:37:21 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats