Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42087— OpenC3 COSMOS: SQL Injection in QuestDB Time-Series Data Base

CVSS 9.6 · Critical EPSS 0.03% · P7
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42087

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OpenC3 COSMOS: SQL Injection in QuestDB Time-Series Data Base
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. From version 6.7.0 to before version 7.0.0-rc3, a SQL injection vulnerability exists in the Time-Series Database (TSDB) component of COSMOS. The tsdb_lookup function in the cvt_model.rb file directly places user-supplied input into a SQL query without sanitizing the input. As a result, a user can break out of the initial SQL statement and execute arbitrary SQL commands, including deleting data. This issue has been patched in version 7.0.0-rc3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenC3 COSMOS SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenC3 COSMOS是OpenC3开源的一个应用程序。 OpenC3 COSMOS 6.7.0版本至7.0.0-rc3之前版本存在SQL注入漏洞,该漏洞源于Time-Series Database组件中tsdb_lookup函数未对用户输入进行清理直接放入SQL查询,可能导致SQL注入攻击,包括删除数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenC3cosmos >= 6.7.0, < 7.0.0-rc3 -

II. Public POCs for CVE-2026-42087

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42087

登录查看更多情报信息。

Same Patch Batch · OpenC3 · 2026-05-04 · 5 CVEs total

CVE-2026-420889.6 CRITICALOpenC3 COSMOS: Administrative Actions via the Script Runner Tool
CVE-2026-420848.1 HIGHOpenC3 COSMOS: Hijacked session token can be used to reset password for persistence
CVE-2026-420864.6 MEDIUMOpenC3 COSMOS: Self-XSS in the Command Sender
CVE-2026-420854.3 MEDIUMOpenC3 COSMOS: Arbitrary write to plugins directory via path-traversed config filenames

IV. Related Vulnerabilities

V. Comments for CVE-2026-42087

No comments yet


Leave a comment