Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25228: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in SignalK signalk-server

0
Medium
VulnerabilityCVE-2026-25228cvecve-2026-25228cwe-22
Published: Mon Feb 02 2026 (02/02/2026, 23:02:52 UTC)
Source: CVE Database V5
Vendor/Project: SignalK
Product: signalk-server

Description

Signal K Server is a server application that runs on a central hub in a boat. Prior to 2.20.3, a path traversal vulnerability in SignalK Server's applicationData API allows authenticated users on Windows systems to read, write, and list arbitrary files and directories on the filesystem. The validateAppId() function blocks forward slashes (/) but not backslashes (\), which are treated as directory separators by path.join() on Windows. This enables attackers to escape the intended applicationData directory. This vulnerability is fixed in 2.20.3.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:42:56 UTC

Technical Analysis

CVE-2026-25228 is a path traversal vulnerability classified under CWE-22 found in the SignalK Server application, a server running on central hubs typically used in maritime environments such as boats. The vulnerability affects versions prior to 2.20.3 and specifically targets Windows systems. The root cause is improper validation in the validateAppId() function, which blocks forward slashes ('/') but fails to block backslashes ('\'). On Windows, backslashes are treated as directory separators by the path.join() function. This oversight allows authenticated users to craft malicious input containing backslashes to traverse directories outside the intended applicationData directory. Consequently, attackers can read, write, and list arbitrary files and directories on the underlying filesystem, potentially exposing sensitive data or enabling further attacks. The vulnerability requires the attacker to be authenticated but does not require additional user interaction. The CVSS 3.1 score is 5.0, reflecting a medium severity with network attack vector, low attack complexity, and partial confidentiality impact but no integrity or availability impact. No known exploits have been reported in the wild. The issue is resolved in SignalK Server version 2.20.3, where input validation has been corrected to properly handle backslashes and prevent directory traversal. This vulnerability is particularly relevant for maritime organizations and IoT deployments using SignalK Server on Windows hubs, where unauthorized filesystem access could lead to data leakage or operational disruptions.

Potential Impact

For European organizations, especially those in maritime industries, shipping, and IoT deployments using SignalK Server on Windows platforms, this vulnerability poses a risk of unauthorized access to sensitive filesystem data. Attackers with valid credentials could read confidential configuration files or logs, potentially exposing operational details or personal data. They could also write files, which might be leveraged to implant malicious payloads or disrupt normal operations. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach could facilitate further attacks or data exfiltration. Given the niche use of SignalK Server in maritime and related IoT contexts, the impact is more pronounced in organizations managing fleets, ports, or marine research facilities. The medium severity rating suggests a moderate risk that should be addressed promptly to avoid escalation. The requirement for authentication limits exposure but insider threats or compromised credentials could still enable exploitation. The lack of known exploits in the wild reduces immediate urgency but does not eliminate risk, especially as threat actors may develop exploits over time.

Mitigation Recommendations

European organizations should immediately upgrade SignalK Server to version 2.20.3 or later to remediate this vulnerability. Until patching is possible, restrict access to the applicationData API to trusted and minimal user groups to reduce the risk of exploitation. Implement strict authentication and authorization controls, including multi-factor authentication, to prevent unauthorized access to the server. Conduct regular audits of user accounts and permissions to detect any anomalous access patterns. Monitor filesystem access logs for unusual read/write activities that could indicate exploitation attempts. Network segmentation of the SignalK Server environment can limit exposure from compromised credentials. Additionally, consider deploying host-based intrusion detection systems (HIDS) to alert on suspicious file system operations. Educate administrators and users about the risks of path traversal vulnerabilities and the importance of timely patching. Finally, review and harden related application input validation logic to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-30T14:44:47.328Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813006f9fa50a62f63a41c

Added to database: 2/2/2026, 11:15:18 PM

Last enriched: 2/10/2026, 10:42:56 AM

Last updated: 3/20/2026, 9:25:30 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses