Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42088— OpenC3 COSMOS: Administrative Actions via the Script Runner Tool

CVSS 9.6 · Critical EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42088

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OpenC3 COSMOS: Administrative Actions via the Script Runner Tool
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the openc3-COSMOS-script-runner-api container. Because all the docker containers share a network, users can execute specially crafted scripts to bypass the API permissions check and perform administrative actions, including reading and modifying data inside the Redis database, which can be used to read secrets and change COSMOS settings, as well as read and write to the buckets service, which holds configuration, log, and plugin files. These actions are normally only available from the Admin Console or with administrative privileges. Any user with permission to create and run scripts can connect to any service in the docker network. This issue has been patched in version 7.0.0-rc3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
带着不必要的权限执行
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenC3 COSMOS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenC3 COSMOS是OpenC3开源的一个应用程序。 OpenC3 COSMOS 7.0.0-rc3之前版本存在安全漏洞,该漏洞源于Script Runner部件允许用户执行Python和Ruby脚本,可能导致用户绕过API权限检查并执行管理操作,包括读取和修改Redis数据库数据以及读写存储桶服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenC3cosmos < 7.0.0-rc3 -

II. Public POCs for CVE-2026-42088

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42088

登录查看更多情报信息。

Same Patch Batch · OpenC3 · 2026-05-04 · 5 CVEs total

CVE-2026-420879.6 CRITICALOpenC3 COSMOS: SQL Injection in QuestDB Time-Series Data Base
CVE-2026-420848.1 HIGHOpenC3 COSMOS: Hijacked session token can be used to reset password for persistence
CVE-2026-420864.6 MEDIUMOpenC3 COSMOS: Self-XSS in the Command Sender
CVE-2026-420854.3 MEDIUMOpenC3 COSMOS: Arbitrary write to plugins directory via path-traversed config filenames

IV. Related Vulnerabilities

V. Comments for CVE-2026-42088

No comments yet


Leave a comment