{"id":"CVE-2026-23515","summary":"RCE - Command Injection in Signal K set-system-time plugin","details":"Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the set-system-time plugin is enabled. Unauthenticated users can also exploit this vulnerability if security is disabled on the Signal K server. This occurs due to unsafe construction of shell commands when processing navigation.datetime values received via WebSocket delta messages. This vulnerability is fixed in 1.5.0.","aliases":["GHSA-p8gp-2w28-mhwg"],"modified":"2026-04-10T05:40:33.619653Z","published":"2026-02-02T20:43:32.219Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23515.json","cwe_ids":["CWE-78"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23515.json"},{"type":"ADVISORY","url":"https://github.com/SignalK/signalk-server/security/advisories/GHSA-p8gp-2w28-mhwg"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23515"},{"type":"FIX","url":"https://github.com/SignalK/set-system-time/commit/75b11eae2de528bf89ede3fb1f7ed057ddbb4d24"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/signalk/set-system-time","events":[{"introduced":"0"},{"fixed":"f4bdeea61261185993d68a87f96996e7790bef22"}]}],"versions":["v1.0.0","v1.1.0","v1.2.0","v1.3.0","v1.3.1","v1.4.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23515.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/signalk/signalk-server","events":[{"introduced":"0"},{"fixed":"83016dc0c56c19670e0f9d202a293964fcfcd972"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.5.0"}]}}],"versions":["0.1.1","0.1.10","0.1.11","0.1.12","0.1.19","0.1.2","0.1.3","0.1.4","0.1.5","0.1.6","0.1.7","0.1.8","0.1.9","v0.1.24","v0.1.26","v0.1.27","v0.1.28","v0.1.29","v0.1.30","v0.1.33","v1.0.0","v1.0.0-0","v1.0.0-1","v1.0.0-2","v1.0.0-3","v1.0.0-4","v1.1.0","v1.1.1","v1.1.2","v1.2.0","v1.2.1","v1.2.2","v1.2.3","v1.2.4","v1.3.0","v1.4.0","v1.4.1","v1.4.2","v1.4.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23515.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}