Moderate severityOSV Advisory· Published Jan 1, 2026· Updated Jan 2, 2026
Signal K Server Vulnerable to Unauthenticated Information Disclosure via Exposed Endpoints
CVE-2025-68273
Description
Signal K Server is a server application that runs on a central hub in a boat. An unauthenticated information disclosure vulnerability in versions prior to 2.19.0 allows any user to retrieve sensitive system information, including the full SignalK data schema, connected serial devices, and installed analyzer tools. This exposure facilitates reconnaissance for further attacks. Version 2.19.0 patches the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
signalk-servernpm | < 2.19.0 | 2.19.0 |
Affected products
1- Range: 0.1.1, 0.1.10, 0.1.11, …
Patches
1ead2a03d8994Merge commit from fork
1 file changed · +4 −1
src/tokensecurity.js+4 −1 modified@@ -251,6 +251,8 @@ module.exports = function (app, config) { '/providers', '/settings', '/webapps', + '/availablePaths', + '/hasAnalyzer', '/skServer/inputTest' ].forEach((p) => app.use(`${SERVERROUTESPREFIX}${p}`, http_authorize(false)) @@ -271,7 +273,8 @@ module.exports = function (app, config) { '/backup', '/restore', '/providers', - '/vessel' + '/vessel', + '/serialports' ].forEach((p) => app.use(`${SERVERROUTESPREFIX}${p}`, adminAuthenticationMiddleware(false)) )
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-fpf5-w967-rr2mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-68273ghsaADVISORY
- github.com/SignalK/signalk-server/commit/ead2a03d8994969cafcca0320abee16f0e66e7a9ghsaWEB
- github.com/SignalK/signalk-server/releases/tag/v2.19.0ghsax_refsource_MISCWEB
- github.com/SignalK/signalk-server/security/advisories/GHSA-fpf5-w967-rr2mghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.