Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. signalk-server
  4. ›
  5. CVE-2026-25228

CVE-2026-25228: SignalK Server has Path Traversal leading to information disclosure

February 2, 2026 (updated February 3, 2026)

A Path Traversal vulnerability in SignalK Server’s applicationData API allows authenticated users on Windows systems to read, write, and list arbitrary files and directories on the filesystem. The validateAppId() function blocks forward slashes (/) but not backslashes (\), which are treated as directory separators by path.join() on Windows. This enables attackers to escape the intended applicationData directory.

References

  • github.com/SignalK/signalk-server
  • github.com/SignalK/signalk-server/commit/9bcf61c8fe2cb8a40998b913a02fb64dff9e86c7
  • github.com/SignalK/signalk-server/security/advisories/GHSA-vrhw-v2hw-jffx
  • github.com/advisories/GHSA-vrhw-v2hw-jffx
  • nvd.nist.gov/vuln/detail/CVE-2026-25228

Code Behaviors & Features

Detect and mitigate CVE-2026-25228 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.20.3

Fixed versions

  • 2.20.3

Solution

Upgrade to version 2.20.3 or above.

Impact 5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

npm/signalk-server/CVE-2026-25228.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:21 +0000.