Unauthorized Access Vulnerability in OCPP WebSocket Endpoint by Vendor
CVE-2026-26288
9.3CRITICAL
What is CVE-2026-26288?
The vulnerability in the OCPP WebSocket endpoints arises from a lack of proper authentication mechanisms. This flaw allows an attacker to perform unauthorized station impersonation by connecting to the WebSocket endpoint using a known charging station identifier. Once connected, the attacker can issue or receive OCPP commands as if they are a legitimate charger. The absence of authentication paves the way for potential privilege escalation, enabling unauthorized control over charging infrastructure and the possibility of data corruption within the charging network reported to the backend.
Affected Version(s)
api.everon.io All versions
References
CVSS V4
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Khaled Sarieddine and Mohammad Ali Sayed reported this vulnerability to CISA.
