Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. openc3
  4. ›
  5. CVE-2026-42087

CVE-2026-42087: OpenC3 COSMOS has SQL Injection in QuestDB Time-Series Database

April 23, 2026 (updated May 4, 2026)

Vulnerability Type: CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) Attack type: Authenticated remote Impact: Telemetry data disclosure and deletion Affected components: openc3-tsdb (QuestDB)

A SQL injection vulnerability exists in the Time-Series Database (TSDB) component of COSMOS. The tsdb_lookup function in the cvt_model.rb file directly places user-supplied input into a SQL query without sanitizing the input. As a result, a user can break out of the initial SQL statement and execute arbitrary SQL commands, including deleting data.

Figure 1: Source code vulnerable to SQL injection Additionally, the get_tlm_values RPC endpoint only requires “tlm” permissions, allowing any user with the Admin, Operator, Viewer, or Runner roles to send a request to the TSDB. This permission is defined in roles-permissions.md to allow for the user to view telemetry data, but this vulnerability also allows them to delete data and tables.

Figure 2: Source code showing the required permissions for the get_tlm_values endpoint Sending a normal request to the endpoint brings back a single array of values for the parameter:

Figure 3: A normal request to the get_tlm_values endpoint However, sending a specially crafted request within the start_time variable brings back all the data in the database:

Figure 4: The request and response after sending the SQL injection payload This payload can be modified to executes SQL commands in the TSDB.

Figure 5: SQL injection used to execute arbitrary SQL command The user can then delete all the historical data in the database:

Figure 6: Example payload dropping the tables

References

  • github.com/OpenC3/cosmos
  • github.com/OpenC3/cosmos/commit/9ba60c09c8836a37a2e4ea67ab35fe403e041415
  • github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3
  • github.com/OpenC3/cosmos/security/advisories/GHSA-v529-vhwc-wfc5
  • github.com/advisories/GHSA-v529-vhwc-wfc5
  • nvd.nist.gov/vuln/detail/CVE-2026-42087

Code Behaviors & Features

Detect and mitigate CVE-2026-42087 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 6.7.0 before 7.0.0-rc3

Fixed versions

  • 7.0.0-rc3

Solution

Upgrade to version 7.0.0-rc3 or above.

Impact 9.6 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

gem/openc3/CVE-2026-42087.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:10 +0000.