Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25114: CWE-307 in CloudCharge cloudcharge.se

0
High
VulnerabilityCVE-2026-25114cvecve-2026-25114cwe-307
Published: Thu Feb 26 2026 (02/26/2026, 23:27:18 UTC)
Source: CVE Database V5
Vendor/Project: CloudCharge
Product: cloudcharge.se

Description

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 20:58:10 UTC

Technical Analysis

CVE-2026-25114 identifies a vulnerability in the CloudCharge cloudcharge.se platform's WebSocket API, specifically a lack of restrictions on the number of authentication requests (CWE-307: Improper Restriction of Excessive Authentication Attempts). This flaw allows an attacker to flood the authentication mechanism with excessive requests without any rate limiting, which can lead to two primary attack vectors: denial-of-service (DoS) and brute-force attacks. In a DoS scenario, the attacker can suppress or mis-route legitimate charger telemetry data, effectively disrupting the normal operation and monitoring of charging stations managed via the platform. Alternatively, the attacker can attempt brute-force authentication attacks to gain unauthorized access to the system, potentially compromising control over charging infrastructure. The vulnerability affects all versions of the product and can be exploited remotely without requiring prior authentication or user interaction, increasing the attack surface. The CVSS v3.1 base score of 7.5 reflects a high severity, primarily due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed, with a significant impact on availability but no direct impact on confidentiality or integrity. No patches or known exploits are currently available, indicating the need for proactive mitigation. The lack of rate limiting on WebSocket authentication requests is a critical design oversight that undermines the resilience of the platform against automated attacks.

Potential Impact

The primary impact of CVE-2026-25114 is on the availability of CloudCharge's charging infrastructure management services. By enabling denial-of-service attacks through overwhelming authentication requests, attackers can disrupt telemetry data flow, leading to loss of monitoring and control over charging stations. This can cause operational downtime, affecting end-users relying on electric vehicle charging services and potentially leading to financial losses and reputational damage for service providers. Additionally, the brute-force attack vector threatens the integrity and security of the system by allowing unauthorized access if successful, which could lead to manipulation of charging operations or data theft. Since the vulnerability requires no authentication and can be exploited remotely, the scope of affected systems is broad, especially in environments where CloudCharge is widely deployed. The lack of known exploits currently limits immediate widespread impact, but the ease of exploitation and high severity score indicate a significant risk if attackers develop exploit tools. Organizations worldwide that depend on CloudCharge for critical infrastructure management face potential service interruptions and security breaches, emphasizing the need for urgent mitigation.

Mitigation Recommendations

To mitigate CVE-2026-25114 effectively, organizations should implement strict rate limiting on authentication requests at the WebSocket API level to prevent excessive attempts from a single source or IP range. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block abnormal authentication request patterns can provide an additional layer of defense. Monitoring and alerting on unusual spikes in authentication traffic will help identify potential attack attempts early. Employing multi-factor authentication (MFA) where possible can reduce the risk of successful brute-force attacks. Network segmentation and limiting exposure of the WebSocket API to trusted networks or VPNs can reduce the attack surface. CloudCharge vendors and users should prioritize the development and deployment of patches or updates that address this vulnerability by introducing built-in rate limiting and authentication throttling mechanisms. Regular security assessments and penetration testing focusing on authentication mechanisms are recommended to identify similar weaknesses. Finally, maintaining an incident response plan that includes scenarios involving DoS and brute-force attacks on critical infrastructure will improve organizational readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-24T00:00:40.071Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0da1732ffcdb8a2723497

Added to database: 2/26/2026, 11:41:11 PM

Last enriched: 3/6/2026, 8:58:10 PM

Last updated: 4/12/2026, 7:59:08 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses