Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42085— OpenC3 COSMOS: Arbitrary write to plugins directory via path-traversed config filenames

CVSS 4.3 · Medium EPSS 0.05% · P15
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42085

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OpenC3 COSMOS: Arbitrary write to plugins directory via path-traversed config filenames
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to versions 6.10.5 and 7.0.0-rc3, OpenC3 COSMOS contains a design flaw in the save_tool_config() function that allows saving tool configuration files at arbitrary locations inside the shared /plugins directory tree by supplying crafted configuration filenames. Although the implementation sufficiently mitigates standard path traversal attacks, by canonicalizing filename to an absolute path, all plugins share this same root directory. That enables users to create arbitrary file structures and overwrite existing configuration files within the shared /plugins directory. This issue has been patched in versions 6.10.5 and 7.0.0-rc3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
相对路径遍历
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenC3 COSMOS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenC3 COSMOS是OpenC3开源的一个应用程序。 OpenC3 COSMOS 6.10.5之前版本和7.0.0-rc3之前版本存在安全漏洞,该漏洞源于save_tool_config函数存在设计缺陷,允许通过提供特制配置文件名在共享插件目录树中任意位置保存工具配置文件,可能导致用户创建任意文件结构并覆盖现有配置文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenC3cosmos < 6.10.5 -

II. Public POCs for CVE-2026-42085

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42085

登录查看更多情报信息。

Same Patch Batch · OpenC3 · 2026-05-04 · 5 CVEs total

CVE-2026-420879.6 CRITICALOpenC3 COSMOS: SQL Injection in QuestDB Time-Series Data Base
CVE-2026-420889.6 CRITICALOpenC3 COSMOS: Administrative Actions via the Script Runner Tool
CVE-2026-420848.1 HIGHOpenC3 COSMOS: Hijacked session token can be used to reset password for persistence
CVE-2026-420864.6 MEDIUMOpenC3 COSMOS: Self-XSS in the Command Sender

IV. Related Vulnerabilities

V. Comments for CVE-2026-42085

No comments yet


Leave a comment