Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p8gp-2w28-mhwg | Signal K set-system-time plugin vulnerable to RCE - Command Injection |
Fri, 27 Feb 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:* |
Wed, 04 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Signalk
Signalk signal K Server Signalk signalk-server |
|
| Vendors & Products |
Signalk
Signalk signal K Server Signalk signalk-server |
Tue, 03 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the set-system-time plugin is enabled. Unauthenticated users can also exploit this vulnerability if security is disabled on the Signal K server. This occurs due to unsafe construction of shell commands when processing navigation.datetime values received via WebSocket delta messages. This vulnerability is fixed in 1.5.0. | |
| Title | RCE - Command Injection in Signal K set-system-time plugin | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-03T15:32:04.099Z
Reserved: 2026-01-13T18:22:43.979Z
Link: CVE-2026-23515
Updated: 2026-02-03T15:31:50.537Z
Status : Analyzed
Published: 2026-02-02T23:16:07.190
Modified: 2026-02-27T13:46:54.247
Link: CVE-2026-23515
No data.
OpenCVE Enrichment
Updated: 2026-04-18T00:45:32Z
Github GHSA