Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26288: CWE-306 in Everon api.everon.io

0
Critical
VulnerabilityCVE-2026-26288cvecve-2026-26288cwe-306
Published: Fri Mar 06 2026 (03/06/2026, 15:15:19 UTC)
Source: CVE Database V5
Vendor/Project: Everon
Product: api.everon.io

Description

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:24:46 UTC

Technical Analysis

CVE-2026-26288 is a critical authentication bypass vulnerability classified under CWE-306, affecting the Everon api.everon.io platform, specifically its OCPP (Open Charge Point Protocol) WebSocket endpoints. These endpoints do not implement any authentication mechanisms, allowing attackers to connect as if they were legitimate charging stations by simply using a known or discovered station identifier. Once connected, attackers can send or receive OCPP commands, effectively impersonating a charging station. This can lead to unauthorized control over charging operations, including starting or stopping charging sessions, manipulating charging parameters, or corrupting data reported to the backend system. The vulnerability impacts all versions of the Everon platform and is remotely exploitable over the network without requiring any privileges or user interaction. The CVSS v3.1 score of 9.4 reflects the high confidentiality and integrity impact, with a low attack complexity and no authentication required. Although no patches or mitigations have been published yet, the flaw poses a severe risk to the integrity and availability of electric vehicle charging infrastructure managed via Everon's platform.

Potential Impact

The vulnerability enables attackers to impersonate legitimate charging stations, leading to unauthorized control over charging infrastructure. This can result in privilege escalation, manipulation of charging sessions, disruption of service availability, and corruption of critical operational data reported to backend systems. Organizations could face operational downtime, financial losses, reputational damage, and potential safety risks if charging stations are manipulated maliciously. The integrity of billing and usage data may also be compromised, affecting revenue and regulatory compliance. Given the increasing reliance on electric vehicle infrastructure, this vulnerability could have widespread implications for utilities, charging network operators, and end users globally.

Mitigation Recommendations

Organizations should immediately implement network-level access controls to restrict connections to the OCPP WebSocket endpoints to trusted sources only. Employ VPNs or private networks to isolate charging station communications from public internet access. Monitor network traffic for anomalous connections or commands that do not correspond to known station identifiers or expected behavior. Implement application-layer authentication proxies or gateways that enforce authentication before allowing WebSocket connections to the backend. Coordinate with Everon for timely patches or updates once available and plan for rapid deployment. Additionally, maintain an inventory of charging station identifiers and monitor for unauthorized use. Consider deploying anomaly detection systems to identify unusual command patterns indicative of impersonation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-25T15:28:27.119Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aaf339c48b3f10ffa20e25

Added to database: 3/6/2026, 3:31:05 PM

Last enriched: 3/13/2026, 7:24:46 PM

Last updated: 4/21/2026, 2:54:33 AM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses