Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x8hc-fqv3-7gwf | Signal K Server: Privilege Escalation by Admin Role Injection via /enableSecurity |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Signalk
Signalk signalk-server |
|
| Vendors & Products |
Signalk
Signalk signalk-server |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.4, there is a privilege escalation vulnerability by Admin Role Injection via /enableSecurity. An unauthenticated attacker can gain full Administrator access to the SignalK server at any time, allowing them to modify sensitive vessel routing data, alter server configurations, and access restricted endpoints. This issue has been patched in version 2.24.0-beta.4. | |
| Title | signalk-server: Privilege Escalation by Admin Role Injection via /enableSecurity | |
| Weaknesses | CWE-285 CWE-288 CWE-862 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T18:02:34.324Z
Reserved: 2026-03-24T19:50:52.105Z
Link: CVE-2026-33950
Updated: 2026-04-03T18:00:56.514Z
Status : Undergoing Analysis
Published: 2026-04-02T17:16:22.993
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-33950
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:18:37Z
Github GHSA