Social Engineering Vulnerability in Signal K Server by Signal K
CVE-2025-69203

6.3MEDIUM

Key Information:

Vendor

Signalk

Vendor
CVE Published:
1 January 2026

What is CVE-2025-69203?

Signal K Server, a central hub server application for boats, has a vulnerability allowing attackers to manipulate access requests and conduct social engineering attacks. Versions before 2.19.0 are affected. The system displays a prominent 'description' field in access requests while the critical 'permissions' field is less visible. This discrepancy enables attackers to request elevated permissions under the guise of a benign intent. Additionally, the application improperly trusts the 'X-Forwarded-For' header, allowing attackers to spoof their IP addresses, making malicious requests appear to originate from internal network addresses. By combining these issues, attackers can impersonate legitimate devices, craft convincing messages, and potentially deceive administrators into granting unauthorized access. To mitigate this risk, users should upgrade to version 2.19.0 or later.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

signalk-server < 2.19.0

References

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.