Session Hijacking Vulnerability in Charging Station WebSocket Backend by Vendor
CVE-2026-20748
What is CVE-2026-20748?
The WebSocket backend for charging stations is compromised by a flaw that allows multiple endpoints to establish connections with the same session identifier. This defect creates predictable session identifiers, which can lead to session hijacking or shadowing. In such scenarios, a malicious actor may exploit this vulnerability to impersonate legitimate users by taking over their active sessions. Moreover, it enables attackers to flood the backend with valid session requests, potentially leading to service disruptions. It is crucial for stakeholders to be aware of this vulnerability and take necessary measures to secure their systems against unauthorized access and ensure proper session management.
Affected Version(s)
api.everon.io All versions
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
