Home

Description

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0, there is an arbitrary prototype read vulnerability via `from` field bypass. This vulnerability allows a low-privileged authenticated user to bypass prototype boundary filtering to extract internal functions and properties from the global prototype object this violates data isolation and lets a user read more than they should. This issue has been patched in version 2.24.0.

PUBLISHED Reserved 2026-03-31 | Published 2026-04-02 | Updated 2026-04-02 | Assigner GitHub_M




LOW: 2.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P

Problem types

CWE-20: Improper Input Validation

CWE-125: Out-of-bounds Read

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 2.24.0
affected

References

github.com/...server/security/advisories/GHSA-qh3j-mrg8-f234

github.com/SignalK/signalk-server/releases/tag/v2.24.0

cve.org (CVE-2026-35038)

nvd.nist.gov (CVE-2026-35038)

Download JSON