Description
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to versions 6.10.5 and 7.0.0-rc3, OpenC3 COSMOS contains a design flaw in the save_tool_config() function that allows saving tool configuration files at arbitrary locations inside the shared /plugins directory tree by supplying crafted configuration filenames. Although the implementation sufficiently mitigates standard path traversal attacks, by canonicalizing filename to an absolute path, all plugins share this same root directory. That enables users to create arbitrary file structures and overwrite existing configuration files within the shared /plugins directory. This issue has been patched in versions 6.10.5 and 7.0.0-rc3.
Published: 2026-05-04
Score: 4.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw in OpenC3 COSMOS arises from the save_tool_config() function, which permits an attacker to provide a crafted configuration filename and persist the file at any path beneath the shared /plugins directory. The weakness corresponds to CWE-23 (Path Traversal), enabling the creation of arbitrary directory structures and overwriting existing configuration files. This write capability can affect integrity of configuration data but is limited to the plugins tree, making it a low‑to‑moderate risk for systems where the /plugins directory is exposed to untrusted input.

Affected Systems

OpenC3 COSMOS versions earlier than 6.10.5 and 7.0.0-rc3 are affected. The issue was fixed in releases 6.10.5 and 7.0.0-rc3. Systems running these or newer versions are not vulnerable.

Risk and Exploitability

The CVSS score of 4.3 indicates low severity; no EPSS data is available and the vulnerability is not listed in CISA KEV, suggesting moderate exploitation likelihood. The attack likely requires local access to the application or untrusted input that can invoke save_tool_config(), since the flaw does not provide a remote code execution surface. Nonetheless, it permits modification of critical configuration files within the plugins tree, potentially causing misconfiguration or downgrade of security controls.

Generated by OpenCVE AI on May 4, 2026 at 18:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading to OpenC3 COSMOS v6.10.5 or newer, or v7.0.0-rc3 or later.
  • Restrict file system permissions on the /plugins directory so that only trusted processes can write files there, mitigating arbitrary file creation.
  • Verify that the application correctly validates configuration file paths before writing, ensuring that no unintended directory traversal can occur.

Generated by OpenCVE AI on May 4, 2026 at 18:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Openc3
Openc3 cosmos
Vendors & Products Openc3
Openc3 cosmos

Mon, 04 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to versions 6.10.5 and 7.0.0-rc3, OpenC3 COSMOS contains a design flaw in the save_tool_config() function that allows saving tool configuration files at arbitrary locations inside the shared /plugins directory tree by supplying crafted configuration filenames. Although the implementation sufficiently mitigates standard path traversal attacks, by canonicalizing filename to an absolute path, all plugins share this same root directory. That enables users to create arbitrary file structures and overwrite existing configuration files within the shared /plugins directory. This issue has been patched in versions 6.10.5 and 7.0.0-rc3.
Title OpenC3 COSMOS: Arbitrary write to plugins directory via path-traversed config filenames
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-04T18:47:32.584Z

Reserved: 2026-04-23T19:17:30.566Z

Link: CVE-2026-42085

cve-icon Vulnrichment

Updated: 2026-05-04T18:43:06.693Z

cve-icon NVD

Status : Received

Published: 2026-05-04T18:16:30.510

Modified: 2026-05-04T19:16:04.110

Link: CVE-2026-42085

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:00:07Z

Weaknesses