Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wgx6-g857-jjf7 | OpenC3 COSMOS: Hijacked session token can be used to reset password for persistence |
Fri, 08 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openc3:cosmos:*:*:*:*:open_source:*:*:* cpe:2.3:a:openc3:cosmos:7.0.0:rc1:*:*:open_source:*:*:* cpe:2.3:a:openc3:cosmos:7.0.0:rc2:*:*:open_source:*:*:* |
Wed, 06 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openc3
Openc3 cosmos |
|
| Vendors & Products |
Openc3
Openc3 cosmos |
Mon, 04 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to versions 6.10.5 and 7.0.0-rc3, the OpenC3 password change functionality allows a user to change their password without providing the old password, by accepting a valid session token instead. In assumed breach scenarios, this behaviour can be exploited by an attacker who has already obtained a valid session token, to gain persistence in hijacked account (including admin) and prevent legitimate users from accessing the account. This issue has been patched in versions 6.10.5 and 7.0.0-rc3. | |
| Title | OpenC3 COSMOS: Hijacked session token can be used to reset password for persistence | |
| Weaknesses | CWE-620 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-06T13:39:58.104Z
Reserved: 2026-04-23T19:17:30.566Z
Link: CVE-2026-42084
Updated: 2026-05-06T13:39:49.539Z
Status : Analyzed
Published: 2026-05-04T18:16:30.357
Modified: 2026-05-08T19:54:14.983
Link: CVE-2026-42084
No data.
OpenCVE Enrichment
Updated: 2026-05-04T19:43:53Z
Github GHSA