Home

Description

OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the openc3-COSMOS-script-runner-api container. Because all the docker containers share a network, users can execute specially crafted scripts to bypass the API permissions check and perform administrative actions, including reading and modifying data inside the Redis database, which can be used to read secrets and change COSMOS settings, as well as read and write to the buckets service, which holds configuration, log, and plugin files. These actions are normally only available from the Admin Console or with administrative privileges. Any user with permission to create and run scripts can connect to any service in the docker network. This issue has been patched in version 7.0.0-rc3.

PUBLISHED Reserved 2026-04-23 | Published 2026-05-04 | Updated 2026-05-04 | Assigner GitHub_M




CRITICAL: 9.6CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

Problem types

CWE-250: Execution with Unnecessary Privileges

Product status

< 7.0.0-rc3
affected

References

github.com/...cosmos/security/advisories/GHSA-2wvh-87g2-89hr exploit

github.com/...cosmos/security/advisories/GHSA-2wvh-87g2-89hr

github.com/OpenC3/cosmos/releases/tag/v7.0.0

github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3

cve.org (CVE-2026-42088)

nvd.nist.gov (CVE-2026-42088)

Download JSON