CVE-2026-33951

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.1, the SignalK Server exposes an unauthenticated HTTP endpoint that allows remote attackers to modify navigation data source priorities. This endpoint, accessible via PUT /signalk/v1/api/sourcePriorities, does not enforce authentication or authorization checks and directly assigns user-controlled input to the server configuration. As a result, attackers can influence which GPS, AIS, or other sensor data sources are trusted by the system. The changes are immediately applied and persisted to disk, allowing the manipulation to survive server restarts. This issue has been patched in version 2.24.0-beta.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:*

History

06 Apr 2026, 15:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:*
First Time Signalk
Signalk signal K Server
References () https://github.com/SignalK/signalk-server/releases/tag/v2.24.0-beta.1 - () https://github.com/SignalK/signalk-server/releases/tag/v2.24.0-beta.1 - Product, Release Notes
References () https://github.com/SignalK/signalk-server/security/advisories/GHSA-gfmv-vh34-h2x5 - () https://github.com/SignalK/signalk-server/security/advisories/GHSA-gfmv-vh34-h2x5 - Vendor Advisory

02 Apr 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 17:16

Updated : 2026-04-06 15:03


NVD link : CVE-2026-33951

Mitre link : CVE-2026-33951

CVE.ORG link : CVE-2026-33951


JSON object : View

Products Affected

signalk

  • signal_k_server
CWE
CWE-284

Improper Access Control

CWE-306

Missing Authentication for Critical Function