CVE-2026-23515 – Signal K Server Remote Code Execution Vulnerability

CVSS 9.9 CRITICAL

“A critical weakness in a marine data server could let attackers execute commands and take full control of connected systems.”

This patch addresses a critical vulnerability (CVE-2026-23515) affecting Signal K Server, an open-source platform used to collect and distribute marine navigation and vessel data. The issue exists in the server’s handling of certain external inputs, where improper validation allows attackers to inject malicious commands through crafted requests.

An attacker with network access to a vulnerable Signal K Server instance could exploit this weakness to execute arbitrary commands on the host system. Successful exploitation may allow attackers to take full control of the server, manipulate vessel data streams, or disrupt connected navigation services. CVE-2026-23515 carries a CVSS v3.1 score of 10.0 (Critical).

Security updates address the vulnerability by improving input validation and strengthening how external requests are processed. Systems running vulnerable versions remain exposed to remote compromise until the patched release is installed.

Key Details

Affected Product
Signalk Signal K Server
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
CWE Classification
CWE-78
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.