Session Hijacking Vulnerability in Charging Station Backend Software by CloudCharge
CVE-2026-27652

6.9MEDIUM

Key Information:

Vendor
CVE Published:
26 February 2026

What is CVE-2026-27652?

The charging station backend software by CloudCharge allows multiple endpoints to connect using the same session identifier due to flawed handling of charging station identifiers. This implementation leads to predictable session identifiers, making it possible for malicious actors to hijack sessions. When a new endpoint connects, it can displace the legitimate connection, gaining access to backend commands intended for the authenticated charging station. This situation not only opens doors for unauthorized user authentication but also holds the risk of denial-of-service attacks as the backend may be overwhelmed by a flood of legitimate session requests from compromised connections.

Affected Version(s)

cloudcharge.se All versions

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Khaled Sarieddine and Mohammad Ali Sayed reported this vulnerability to CISA.
.