๐Ÿ” CVE Alert

CVE-2026-33951

UNKNOWN 0.0

signalk-server: Unauthenticated Source Priorities Manipulation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.1, the SignalK Server exposes an unauthenticated HTTP endpoint that allows remote attackers to modify navigation data source priorities. This endpoint, accessible via PUT /signalk/v1/api/sourcePriorities, does not enforce authentication or authorization checks and directly assigns user-controlled input to the server configuration. As a result, attackers can influence which GPS, AIS, or other sensor data sources are trusted by the system. The changes are immediately applied and persisted to disk, allowing the manipulation to survive server restarts. This issue has been patched in version 2.24.0-beta.1.

CWE CWE-284 CWE-306
Vendor signalk
Product signalk-server
Published Apr 2, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for signalk signalk-server

Be the first to know when new unknown vulnerabilities affecting signalk signalk-server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

SignalK / signalk-server
< 2.24.0-beta.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/SignalK/signalk-server/security/advisories/GHSA-gfmv-vh34-h2x5 github.com: https://github.com/SignalK/signalk-server/releases/tag/v2.24.0-beta.1