VYPR
Critical severityOSV Advisory· Published Feb 2, 2026· Updated Feb 3, 2026

RCE - Command Injection in Signal K set-system-time plugin

CVE-2026-23515

Description

Signal K Server is a server application that runs on a central hub in a boat. Prior to 1.5.0, a command injection vulnerability allows authenticated users with write permissions to execute arbitrary shell commands on the Signal K server when the set-system-time plugin is enabled. Unauthenticated users can also exploit this vulnerability if security is disabled on the Signal K server. This occurs due to unsafe construction of shell commands when processing navigation.datetime values received via WebSocket delta messages. This vulnerability is fixed in 1.5.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
@signalk/set-system-timenpm
< 1.5.01.5.0

Affected products

1

Patches

1
75b11eae2de5

fix: validate datetime format before shell interpolation

https://github.com/SignalK/set-system-timeKE GustafssonJan 11, 2026via ghsa
1 file changed · +6 0
  • index.js+6 0 modified
    @@ -61,6 +61,12 @@ module.exports = function (app) {
               console.error("Set-system-time supports only linux-like os's")
             } else {
               if( ! plugin.useNetworkTime(options) ){
    +            // Validate datetime format to prevent command injection
    +            if (!/^\d{4}-\d{2}-\d{2}T\d{2}:\d{2}:\d{2}(\.\d+)?Z?$/.test(datetime)) {
    +              lastMessage = 'Invalid datetime format received: ' + String(datetime).substring(0, 50)
    +              logError(lastMessage)
    +              return
    +            }
                 const useSudoFallback = typeof options.sudo === 'undefined' || options.sudo
                 // Convert ISO 8601 datetime to format compatible with both GNU date and BusyBox date
                 // e.g., "2024-01-10T17:55:03.000Z" → "2024-01-10 17:55:03"
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.