OIDC Login Vulnerability in Signal K Server by Signal K
CVE-2026-34083
6.1MEDIUM
What is CVE-2026-34083?
Signal K Server, utilized as a central hub in boating applications, is susceptible to a code-level vulnerability within its OIDC login and logout processes. This flaw arises from the unvalidated HTTP Host header, which is leveraged to construct the OAuth2 redirect_uri. Due to the default configuration where redirectUri is unset, attackers can craft malicious HTTP requests to spoof the Host header. This manipulation allows them to capture OAuth authorization codes and potentially hijack user sessions, exposing users to significant security risks. The vulnerability has been resolved in version 2.24.0. For more details, see the official advisory at GitHub.
Affected Version(s)
signalk-server < 2.24.0
