Unauthenticated HTTP Endpoint in Signal K Server Allows Data Manipulation
CVE-2026-33951
6.9MEDIUM
What is CVE-2026-33951?
Signal K Server, used in nautical applications, has a significant vulnerability where an unauthenticated HTTP endpoint permits attackers to alter navigation data source priorities. This flaw exists due to the absence of proper authentication and authorization checks on the PUT /signalk/v1/api/sourcePriorities endpoint. Malicious actors can inject user-controlled input, affect the trustworthiness of GPS, AIS, and other sensor data, and the modifications persist even after server restarts. This vulnerability is rectified in version 2.24.0-beta.1, highlighting the importance of keeping software up-to-date.
Affected Version(s)
signalk-server < 2.24.0-beta.1
