We found results for “”
CVE-2025-66398
Good to know:
Date: January 1, 2026
Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.19.0, an unauthenticated attacker can pollute the internal state ("restoreFilePath") of the server via the "/skServer/validateBackup" endpoint. This allows the attacker to hijack the administrator's "Restore" functionality to overwrite critical server configuration files (e.g., "security.json", "package.json"), leading to account takeover and Remote Code Execution (RCE). Version 2.19.0 patches this vulnerability.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version signalk-server - 2.19.0;https://github.com/SignalK/signalk-server.git - v2.19.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


