CVE-2025-28384
Description
An issue in the /script-api/scripts/ endpoint of OpenC3 COSMOS before 6.1.0 allows attackers to execute a directory traversal.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Directory traversal vulnerability in OpenC3 COSMOS /script-api/scripts/ endpoint allows attackers to read arbitrary files before v6.1.0.
The /script-api/scripts/ endpoint in OpenC3 COSMOS versions prior to 6.1.0 fails to properly sanitize user-supplied path parameters, allowing directory traversal [4]. This permits an attacker to access files outside the intended scripts directory.
The vulnerability can be exploited by sending a crafted HTTP request to the /script-api/scripts/ endpoint with path traversal sequences (e.g., ../). While the endpoint may require authentication in typical deployments, an unauthenticated attacker with network access to the COSMOS web interface can exploit it if the endpoint is exposed.
Successful exploitation enables an attacker to read arbitrary files from the server filesystem, including configuration files, credentials, or other sensitive data. This could lead to further compromise of the COSMOS instance and connected systems.
The issue is fixed in OpenC3 COSMOS version 6.1.0, which includes a patch that disallows parent directory paths in the sanitize_params function [4]. Users are advised to upgrade to the latest version.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3- OpenC3/OpenC3 COSMOSdescription
- ghsa-coords
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- github.com/advisories/GHSA-p67j-387g-75wcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-28384ghsaADVISORY
- github.com/OpenC3/cosmos/pull/1828ghsaWEB
- github.com/OpenC3/cosmos/pull/1828/commits/fc7e11310a7cdf9f1939886e1b29009db4d4b718ghsaWEB
- github.com/OpenC3/cosmos/releases/tag/v6.1.0ghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/openc3-cosmos-tool-iframe/CVE-2025-28384.ymlghsaWEB
- openc3.comghsaWEB
- visionspace.com/openc3-cosmos-a-security-assessment-of-an-open-source-mission-frameworkghsaWEB
- openc3.commitre
- visionspace.com/openc3-cosmos-a-security-assessment-of-an-open-source-mission-framework/mitre
News mentions
0No linked articles in our index yet.