Authentication Flaw in WebSocket Endpoints of Charging Infrastructure by CloudCharge
CVE-2026-20781
9.3CRITICAL
What is CVE-2026-20781?
The identified vulnerability in CloudCharge's charging infrastructure is due to improper authentication mechanisms in WebSocket endpoints. This flaw allows unauthorized actors to impersonate legitimate charging stations by connecting to the OCPP WebSocket endpoint with a known charging station identifier. Without any authentication requirements, these attackers can issue commands and manipulate data interchangeably as if they were legitimate operators. This situation poses risks of unauthorized control over charging infrastructure and potential data corruption within the backend reporting system.
Affected Version(s)
cloudcharge.se All versions
References
CVSS V4
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Khaled Sarieddine and Mohammad Ali Sayed reported this vulnerability to CISA.
