Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-69203

Опубликовано: 01 янв. 2026
Источник: nvd
CVSS3: 6.3
CVSS3: 8.8
EPSS Низкий

Описание

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the access request system have two related features that when combined by themselves and with an information disclosure vulnerability enable convincing social engineering attacks against administrators. When a device creates an access request, it specifies three fields: clientId, description, and permissions. The SignalK admin UI displays the description field prominently to the administrator when showing pending requests, but the actual permissions field (which determines the access level granted) is less visible or displayed separately. This allows an attacker to request admin permissions while providing a description that suggests readonly access. The access request handler trusts the X-Forwarded-For HTTP header without validation to determine the client's IP address. This header is intended to preserve the original client IP when requests pass through reverse prox

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:*
Версия до 2.19.0 (исключая)
cpe:2.3:a:signalk:signal_k_server:2.19.0:beta1:*:*:*:*:*:*
cpe:2.3:a:signalk:signal_k_server:2.19.0:beta2:*:*:*:*:*:*
cpe:2.3:a:signalk:signal_k_server:2.19.0:beta3:*:*:*:*:*:*
cpe:2.3:a:signalk:signal_k_server:2.19.0:beta4:*:*:*:*:*:*

EPSS

Процентиль: 13%
0.00044
Низкий

6.3 Medium

CVSS3

8.8 High

CVSS3

Дефекты

CWE-290

Связанные уязвимости

CVSS3: 6.3
github
около 1 месяца назад

Signal K Server Vulnerable to Access Request Spoofing

EPSS

Процентиль: 13%
0.00044
Низкий

6.3 Medium

CVSS3

8.8 High

CVSS3

Дефекты

CWE-290