Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vmfm-ch9h-5c7g | Signal K Server's WebSocket Login Endpoint Lacks Rate Limiting (Credential Brute-Force) |
Fri, 15 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Signalk signal K Server
|
|
| CPEs | cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Signalk signal K Server
|
|
| Metrics |
cvssV3_1
|
Thu, 14 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 09 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Signalk
Signalk signalk-server |
|
| Vendors & Products |
Signalk
Signalk signalk-server |
Sat, 09 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.25.0, the HTTP login endpoints (POST /login and POST /signalk/v1/auth/login) are protected by express-rate-limit (default: 100 attempts per 10-minute window, configurable via HTTP_RATE_LIMITS). The WebSocket login path — sending {login: {username, password}} messages over an established WebSocket connection — calls app.securityStrategy.login() directly without any rate limiting. An attacker can bypass HTTP rate limiting entirely by opening a WebSocket connection and attempting unlimited password guesses at the speed bcrypt allows (~20 attempts/sec with 10 salt rounds). This issue has been patched in version 2.25.0. | |
| Title | Signal K Server's WebSocket Login Endpoint Lacks Rate Limiting (Credential Brute-Force) | |
| Weaknesses | CWE-307 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T17:50:55.289Z
Reserved: 2026-04-22T15:11:54.671Z
Link: CVE-2026-41893
Updated: 2026-05-14T17:48:58.670Z
Status : Analyzed
Published: 2026-05-09T20:16:27.273
Modified: 2026-05-15T19:14:13.597
Link: CVE-2026-41893
No data.
OpenCVE Enrichment
Updated: 2026-05-09T20:30:41Z
Github GHSA