Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42086— OpenC3 COSMOS: Self-XSS in the Command Sender

CVSS 4.6 · Medium EPSS 0.04% · P11
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42086

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OpenC3 COSMOS: Self-XSS in the Command Sender
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0, the Command Sender UI uses an unsafe eval() function on array-like command parameters, which allows a user-supplied payload to execute in the browser when sending a command. This creates a self-XSS risk because an attacker can trigger their own script execution in the victim’s session, if allowed to influence the array parameter input, for example via phishing. If successful, an attacker may read or modify data in the authenticated browser context, including session tokens in local storage. This issue has been patched in version 7.0.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenC3 COSMOS 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenC3 COSMOS是OpenC3开源的一个应用程序。 OpenC3 COSMOS 7.0.0之前版本存在跨站脚本漏洞,该漏洞源于Command Sender UI对数组类命令参数使用不安全的eval函数,可能导致用户提供的有效载荷在浏览器中执行,造成自跨站脚本攻击,攻击者可读取或修改认证浏览器上下文中的数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenC3cosmos < 7.0.0 -

II. Public POCs for CVE-2026-42086

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42086

登录查看更多情报信息。

Same Patch Batch · OpenC3 · 2026-05-04 · 5 CVEs total

CVE-2026-420879.6 CRITICALOpenC3 COSMOS: SQL Injection in QuestDB Time-Series Data Base
CVE-2026-420889.6 CRITICALOpenC3 COSMOS: Administrative Actions via the Script Runner Tool
CVE-2026-420848.1 HIGHOpenC3 COSMOS: Hijacked session token can be used to reset password for persistence
CVE-2026-420854.3 MEDIUMOpenC3 COSMOS: Arbitrary write to plugins directory via path-traversed config filenames

IV. Related Vulnerabilities

V. Comments for CVE-2026-42086

No comments yet


Leave a comment