Home

Description

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.4, there is a privilege escalation vulnerability by Admin Role Injection via /enableSecurity. An unauthenticated attacker can gain full Administrator access to the SignalK server at any time, allowing them to modify sensitive vessel routing data, alter server configurations, and access restricted endpoints. This issue has been patched in version 2.24.0-beta.4.

PUBLISHED Reserved 2026-03-24 | Published 2026-04-02 | Updated 2026-04-03 | Assigner GitHub_M




CRITICAL: 9.4CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Problem types

CWE-285: Improper Authorization

CWE-288: Authentication Bypass Using an Alternate Path or Channel

CWE-862: Missing Authorization

Product status

< 2.24.0-beta.4
affected

References

github.com/...server/security/advisories/GHSA-x8hc-fqv3-7gwf

github.com/...alK/signalk-server/releases/tag/v2.24.0-beta.4

cve.org (CVE-2026-33950)

nvd.nist.gov (CVE-2026-33950)

Download JSON