{"api_version":"1","generated_at":"2026-05-05T15:52:45+00:00","cve":"CVE-2026-42085","urls":{"html":"https://cve.report/CVE-2026-42085","api":"https://cve.report/api/cve/CVE-2026-42085.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-42085","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-42085"},"summary":{"title":"OpenC3 COSMOS: Arbitrary write to plugins directory via path-traversed config filenames","description":"OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to versions 6.10.5 and 7.0.0-rc3, OpenC3 COSMOS contains a design flaw in the save_tool_config() function that allows saving tool configuration files at arbitrary locations inside the shared /plugins directory tree by supplying crafted configuration filenames. Although the implementation sufficiently mitigates standard path traversal attacks, by canonicalizing filename to an absolute path, all plugins share this same root directory. That enables users to create arbitrary file structures and overwrite existing configuration files within the shared /plugins directory. This issue has been patched in versions 6.10.5 and 7.0.0-rc3.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-04 18:16:30","updated_at":"2026-05-04 19:16:04"},"problem_types":["CWE-23","CWE-23 CWE-23: Relative Path Traversal"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/OpenC3/cosmos/commit/e6efccbd148ba0e3361c5891027f2373aa140d42","name":"https://github.com/OpenC3/cosmos/commit/e6efccbd148ba0e3361c5891027f2373aa140d42","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/OpenC3/cosmos/releases/tag/v6.10.5","name":"https://github.com/OpenC3/cosmos/releases/tag/v6.10.5","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/OpenC3/cosmos/commit/9957a9fa460c0c0cf5cdbf6a5931bbdd025246a5","name":"https://github.com/OpenC3/cosmos/commit/9957a9fa460c0c0cf5cdbf6a5931bbdd025246a5","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-4jvx-93h3-f45h","name":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-4jvx-93h3-f45h","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3","name":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-42085","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42085","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"OpenC3","product":"cosmos","version":"affected < 6.10.5","platforms":[]},{"source":"CNA","vendor":"OpenC3","product":"cosmos","version":"affected >= 7.0.0.pre.rc1, < 7.0.0-rc3","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-42085","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-05-04T18:43:28.813129Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-05-04T18:47:32.584Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-4jvx-93h3-f45h"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"cosmos","vendor":"OpenC3","versions":[{"status":"affected","version":"< 6.10.5"},{"status":"affected","version":">= 7.0.0.pre.rc1, < 7.0.0-rc3"}]}],"descriptions":[{"lang":"en","value":"OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to versions 6.10.5 and 7.0.0-rc3, OpenC3 COSMOS contains a design flaw in the save_tool_config() function that allows saving tool configuration files at arbitrary locations inside the shared /plugins directory tree by supplying crafted configuration filenames. Although the implementation sufficiently mitigates standard path traversal attacks, by canonicalizing filename to an absolute path, all plugins share this same root directory. That enables users to create arbitrary file structures and overwrite existing configuration files within the shared /plugins directory. This issue has been patched in versions 6.10.5 and 7.0.0-rc3."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-23","description":"CWE-23: Relative Path Traversal","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-04T17:13:39.277Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-4jvx-93h3-f45h","tags":["x_refsource_CONFIRM"],"url":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-4jvx-93h3-f45h"},{"name":"https://github.com/OpenC3/cosmos/commit/9957a9fa460c0c0cf5cdbf6a5931bbdd025246a5","tags":["x_refsource_MISC"],"url":"https://github.com/OpenC3/cosmos/commit/9957a9fa460c0c0cf5cdbf6a5931bbdd025246a5"},{"name":"https://github.com/OpenC3/cosmos/commit/e6efccbd148ba0e3361c5891027f2373aa140d42","tags":["x_refsource_MISC"],"url":"https://github.com/OpenC3/cosmos/commit/e6efccbd148ba0e3361c5891027f2373aa140d42"},{"name":"https://github.com/OpenC3/cosmos/releases/tag/v6.10.5","tags":["x_refsource_MISC"],"url":"https://github.com/OpenC3/cosmos/releases/tag/v6.10.5"},{"name":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3","tags":["x_refsource_MISC"],"url":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3"}],"source":{"advisory":"GHSA-4jvx-93h3-f45h","discovery":"UNKNOWN"},"title":"OpenC3 COSMOS: Arbitrary write to plugins directory via path-traversed config filenames"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-42085","datePublished":"2026-05-04T17:13:39.277Z","dateReserved":"2026-04-23T19:17:30.566Z","dateUpdated":"2026-05-04T18:47:32.584Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-04 18:16:30","lastModifiedDate":"2026-05-04 19:16:04","problem_types":["CWE-23","CWE-23 CWE-23: Relative Path Traversal"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"42085","Ordinal":"1","Title":"OpenC3 COSMOS: Arbitrary write to plugins directory via path-tra","CVE":"CVE-2026-42085","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"42085","Ordinal":"1","NoteData":"OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to versions 6.10.5 and 7.0.0-rc3, OpenC3 COSMOS contains a design flaw in the save_tool_config() function that allows saving tool configuration files at arbitrary locations inside the shared /plugins directory tree by supplying crafted configuration filenames. Although the implementation sufficiently mitigates standard path traversal attacks, by canonicalizing filename to an absolute path, all plugins share this same root directory. That enables users to create arbitrary file structures and overwrite existing configuration files within the shared /plugins directory. This issue has been patched in versions 6.10.5 and 7.0.0-rc3.","Type":"Description","Title":"OpenC3 COSMOS: Arbitrary write to plugins directory via path-tra"}]}}}