Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-42088
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-04 May, 2026 | 18:16
Updated At-13 May, 2026 | 20:47

OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the openc3-COSMOS-script-runner-api container. Because all the docker containers share a network, users can execute specially crafted scripts to bypass the API permissions check and perform administrative actions, including reading and modifying data inside the Redis database, which can be used to read secrets and change COSMOS settings, as well as read and write to the buckets service, which holds configuration, log, and plugin files. These actions are normally only available from the Admin Console or with administrative privileges. Any user with permission to create and run scripts can connect to any service in the docker network. This issue has been patched in version 7.0.0-rc3.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.6CRITICAL
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Primary3.18.1HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 9.6
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Type: Primary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CPE Matches

openc3
openc3
>>cosmos>>Versions before 7.0.0(exclusive)
cpe:2.3:a:openc3:cosmos:*:*:*:*:open_source:*:*:*
openc3
openc3
>>cosmos>>7.0.0
cpe:2.3:a:openc3:cosmos:7.0.0:rc1:*:*:open_source:*:*:*
openc3
openc3
>>cosmos>>7.0.0
cpe:2.3:a:openc3:cosmos:7.0.0:rc2:*:*:open_source:*:*:*
Weaknesses
CWE IDTypeSource
CWE-250Secondarysecurity-advisories@github.com
CWE ID: CWE-250
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/OpenC3/cosmos/releases/tag/v7.0.0security-advisories@github.com
Release Notes
https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3security-advisories@github.com
Release Notes
https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hrsecurity-advisories@github.com
Exploit
Vendor Advisory
https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Vendor Advisory
Hyperlink: https://github.com/OpenC3/cosmos/releases/tag/v7.0.0
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Hyperlink: https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Vendor Advisory
Change History
0Changes found

Details not found