Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qh3j-mrg8-f234 | Signal K Server: Arbitrary Prototype Read via `from` Field Bypass |
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Signalk signal K Server
|
|
| CPEs | cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Signalk signal K Server
|
|
| Metrics |
cvssV3_1
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Signalk
Signalk signalk-server |
|
| Vendors & Products |
Signalk
Signalk signalk-server |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0, there is an arbitrary prototype read vulnerability via `from` field bypass. This vulnerability allows a low-privileged authenticated user to bypass prototype boundary filtering to extract internal functions and properties from the global prototype object this violates data isolation and lets a user read more than they should. This issue has been patched in version 2.24.0. | |
| Title | signalk-server: Arbitrary Prototype Read via `from` Field Bypass | |
| Weaknesses | CWE-125 CWE-20 CWE-200 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-02T18:46:36.895Z
Reserved: 2026-03-31T21:06:06.428Z
Link: CVE-2026-35038
No data.
Status : Analyzed
Published: 2026-04-02T17:16:27.163
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-35038
No data.
OpenCVE Enrichment
Updated: 2026-04-07T07:56:03Z
Github GHSA