Description
Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.1, the SignalK Server exposes an unauthenticated HTTP endpoint that allows remote attackers to modify navigation data source priorities. This endpoint, accessible via PUT /signalk/v1/api/sourcePriorities, does not enforce authentication or authorization checks and directly assigns user-controlled input to the server configuration. As a result, attackers can influence which GPS, AIS, or other sensor data sources are trusted by the system. The changes are immediately applied and persisted to disk, allowing the manipulation to survive server restarts. This issue has been patched in version 2.24.0-beta.1.
Published: 2026-04-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Configuration Manipulation of Navigation Sensor Priorities
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an unauthenticated attacker to send a PUT request to the /signalk/v1/api/sourcePriorities endpoint and change the priority of GPS, AIS, or other sensor data sources. Because the change is persisted, the attacker can permanently alter which sensors are trusted, potentially steering navigation decisions without detection. The weakness is a lack of authentication and improper authorization, leading to configuration tampering.

Affected Systems

SignalK Server versions prior to 2.24.0-beta.1 are affected. This applies to all deployments of SignalK Server that expose the default HTTP endpoint for source priority configuration.

Risk and Exploitability

With a CVSS score of 6.9 the vulnerability is Medium‑High severity. The EPSS score is below 1%, indicating a low current exploit probability, and it is not listed in the CISA KEV catalog. The attack vector is remote over HTTP; the attacker needs only network connectivity to the server and no special privileges.

Generated by OpenCVE AI on April 6, 2026 at 17:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update SignalK Server to version 2.24.0-beta.1 or later.
  • If immediate update is not possible, restrict network access to the /signalk/v1/api/sourcePriorities endpoint using firewall rules or VPN so only trusted hosts can reach it.
  • Monitor server logs for unauthorized PUT requests to the source priorites endpoint and audit configuration changes for unexpected alterations.

Generated by OpenCVE AI on April 6, 2026 at 17:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gfmv-vh34-h2x5 Signal K Server: Unauthenticated Source Priorities Manipulation
History

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Signalk signal K Server
CPEs cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:*
Vendors & Products Signalk signal K Server
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Signalk
Signalk signalk-server
Vendors & Products Signalk
Signalk signalk-server

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.1, the SignalK Server exposes an unauthenticated HTTP endpoint that allows remote attackers to modify navigation data source priorities. This endpoint, accessible via PUT /signalk/v1/api/sourcePriorities, does not enforce authentication or authorization checks and directly assigns user-controlled input to the server configuration. As a result, attackers can influence which GPS, AIS, or other sensor data sources are trusted by the system. The changes are immediately applied and persisted to disk, allowing the manipulation to survive server restarts. This issue has been patched in version 2.24.0-beta.1.
Title signalk-server: Unauthenticated Source Priorities Manipulation
Weaknesses CWE-284
CWE-306
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Signalk Signal K Server Signalk-server
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T16:21:53.516Z

Reserved: 2026-03-24T19:50:52.106Z

Link: CVE-2026-33951

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T17:16:23.200

Modified: 2026-04-06T15:03:50.520

Link: CVE-2026-33951

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:56:05Z

Weaknesses