Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. signalk-server
  4. ›
  5. CVE-2026-33951

CVE-2026-33951: Signal K Server: Unauthenticated Source Priorities Manipulation

April 3, 2026 (updated April 6, 2026)

The SignalK Server exposes an unauthenticated HTTP endpoint that allows remote attackers to modify navigation data source priorities. This endpoint, accessible via PUT /signalk/v1/api/sourcePriorities, does not enforce authentication or authorization checks and directly assigns user-controlled input to the server configuration.

As a result, attackers can influence which GPS, AIS, or other sensor data sources are trusted by the system. The changes are immediately applied and persisted to disk, allowing the manipulation to survive server restarts.

References

  • github.com/SignalK/signalk-server
  • github.com/SignalK/signalk-server/releases/tag/v2.24.0-beta.1
  • github.com/SignalK/signalk-server/security/advisories/GHSA-gfmv-vh34-h2x5
  • github.com/advisories/GHSA-gfmv-vh34-h2x5
  • nvd.nist.gov/vuln/detail/CVE-2026-33951

Code Behaviors & Features

Detect and mitigate CVE-2026-33951 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.24.0-beta.1

Fixed versions

  • 2.24.0-beta.1

Solution

Upgrade to version 2.24.0-beta.1 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control
  • CWE-306: Missing Authentication for Critical Function

Source file

npm/signalk-server/CVE-2026-33951.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:44 +0000.