WebSocket endpoints lack proper authentication mechanisms, enabling
attackers to perform unauthorized station impersonation and manipulate
data sent to the backend. An unauthenticated attacker can connect to the
OCPP WebSocket endpoint using a known or discovered charging station
identifier, then issue or receive OCPP commands as a legitimate charger.
Given that no authentication is required, this can lead to privilege
escalation, unauthorized control of charging infrastructure, and
corruption of charging network data reported to the backend.
References
| Link | Resource |
|---|---|
| https://chargemap.com/en-us/support | Product |
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-05.json | Third Party Advisory |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-05 | Third Party Advisory US Government Resource |
Configurations
History
02 Mar 2026, 15:56
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Chargemap chargemap.com
Chargemap |
|
| CPE | cpe:2.3:a:chargemap:chargemap.com:*:*:*:*:*:*:*:* | |
| References | () https://chargemap.com/en-us/support - Product | |
| References | () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-05.json - Third Party Advisory | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-05 - Third Party Advisory, US Government Resource |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 00:16
Updated : 2026-03-05 21:16
NVD link : CVE-2026-25851
Mitre link : CVE-2026-25851
CVE.ORG link : CVE-2026-25851
JSON object : View
Products Affected
chargemap
- chargemap.com
CWE
CWE-306
Missing Authentication for Critical Function
