Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68619: CWE-94: Improper Control of Generation of Code ('Code Injection') in SignalK signalk-server

0
High
VulnerabilityCVE-2025-68619cvecve-2025-68619cwe-94
Published: Thu Jan 01 2026 (01/01/2026, 18:35:19 UTC)
Source: CVE Database V5
Vendor/Project: SignalK
Product: signalk-server

Description

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the appstore interface allow administrators to install npm packages through a REST API endpoint. While the endpoint validates that the package name exists in the npm registry as a known plugin or webapp, the version parameter accepts arbitrary npm version specifiers including URLs. npm supports installing packages from git repositories, GitHub shorthand syntax, and HTTP/HTTPS URLs pointing to tarballs. When npm installs a package, it can automatically execute any `postinstall` script defined in `package.json`, enabling arbitrary code execution. The vulnerability exists because npm's version specifier syntax is extremely flexible, and the SignalK code passes the version parameter directly to npm without sanitization. An attacker with admin access can install a package from an attacker-controlled source containing a malicious `postinstall` script. Version 2.19.0 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 01/08/2026, 22:12:09 UTC

Technical Analysis

SignalK signalk-server is a server application designed to run on a central hub in boats, facilitating data exchange and control. Versions prior to 2.19.0 include a REST API endpoint that allows administrators to install npm packages by specifying a package name and version. While the package name is validated against the npm registry to ensure it is a known plugin or webapp, the version parameter is not sanitized and accepts arbitrary npm version specifiers. npm’s version syntax is highly flexible, allowing installation from git repositories, GitHub shorthand, or HTTP/HTTPS URLs pointing to tarballs. When npm installs a package, it executes any postinstall scripts defined in the package.json file. An attacker with administrative access to the signalk-server can exploit this by specifying a malicious package version pointing to an attacker-controlled source containing a harmful postinstall script. This results in arbitrary code execution on the server, compromising the system. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code) and has a CVSS 4.0 score of 7.3 (high severity), reflecting network attack vector, low complexity, no user interaction, but requiring privileges. The vulnerability was publicly disclosed on January 1, 2026, and fixed in version 2.19.0 of signalk-server.

Potential Impact

For European organizations operating maritime vessels or infrastructure that use SignalK signalk-server, this vulnerability poses a significant risk. Exploitation can lead to full compromise of the central hub server, allowing attackers to execute arbitrary code, potentially leading to data theft, manipulation of navigation or sensor data, disruption of vessel operations, or pivoting to other internal systems. The compromise of maritime control systems could have safety, operational, and regulatory consequences, especially for commercial shipping, research vessels, or critical infrastructure monitoring. Given the network-exposed nature of the API and the lack of user interaction required, the attack surface is broad for insiders or attackers who gain administrative credentials. The vulnerability undermines confidentiality, integrity, and availability of the affected systems, potentially causing operational downtime and financial losses.

Mitigation Recommendations

European organizations should immediately upgrade all signalk-server instances to version 2.19.0 or later, where the vulnerability is patched. Until upgrade is possible, restrict administrative access to the REST API to trusted personnel and networks, employing network segmentation and strong authentication controls. Monitor logs for unusual npm package installation requests or unexpected postinstall script executions. Implement application-layer firewalls or API gateways to validate and sanitize inputs to the package installation endpoint. Conduct regular audits of installed npm packages and verify their sources. Additionally, enforce the principle of least privilege for administrative accounts and consider using containerization or sandboxing to limit the impact of potential code execution. Finally, maintain up-to-date incident response plans tailored to maritime operational technology environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-19T18:50:09.990Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6956c3e8db813ff03e77f102

Added to database: 1/1/2026, 6:58:48 PM

Last enriched: 1/8/2026, 10:12:09 PM

Last updated: 2/7/2026, 6:38:54 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats