Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v529-vhwc-wfc5 | OpenC3 COSMOS has SQL Injection in QuestDB Time-Series Database |
Fri, 08 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openc3:cosmos:*:*:*:*:open_source:*:*:* cpe:2.3:a:openc3:cosmos:7.0.0:rc1:*:*:open_source:*:*:* cpe:2.3:a:openc3:cosmos:7.0.0:rc2:*:*:open_source:*:*:* |
Tue, 05 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openc3
Openc3 cosmos |
|
| Vendors & Products |
Openc3
Openc3 cosmos |
Mon, 04 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. From version 6.7.0 to before version 7.0.0-rc3, a SQL injection vulnerability exists in the Time-Series Database (TSDB) component of COSMOS. The tsdb_lookup function in the cvt_model.rb file directly places user-supplied input into a SQL query without sanitizing the input. As a result, a user can break out of the initial SQL statement and execute arbitrary SQL commands, including deleting data. This issue has been patched in version 7.0.0-rc3. | |
| Title | OpenC3 COSMOS: SQL Injection in QuestDB Time-Series Data Base | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-05T12:46:14.311Z
Reserved: 2026-04-23T19:17:30.566Z
Link: CVE-2026-42087
Updated: 2026-05-05T12:46:03.149Z
Status : Analyzed
Published: 2026-05-04T18:16:30.830
Modified: 2026-05-08T19:53:16.883
Link: CVE-2026-42087
No data.
OpenCVE Enrichment
Updated: 2026-05-04T19:00:07Z
Github GHSA