CVE-2026-23515

Source
https://cve.org/CVERecord?id=CVE-2026-23515
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23515.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23515
Aliases
Published
2026-02-02T20:43:32.219Z
Modified
2026-02-04T21:34:18.984795Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
RCE - Command Injection in Signal K set-system-time plugin
Details

Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the set-system-time plugin is enabled. Unauthenticated users can also exploit this vulnerability if security is disabled on the Signal K server. This occurs due to unsafe construction of shell commands when processing navigation.datetime values received via WebSocket delta messages. This vulnerability is fixed in 1.5.0.

Database specific
{
    "cwe_ids": [
        "CWE-78"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23515.json"
}
References

Affected packages

Git / github.com/signalk/set-system-time

Affected ranges

Type
GIT
Repo
https://github.com/signalk/set-system-time
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.0.0
v1.1.0
v1.2.0
v1.3.0
v1.3.1
v1.4.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23515.json"