{"api_version":"1","generated_at":"2026-05-05T18:57:26+00:00","cve":"CVE-2026-42088","urls":{"html":"https://cve.report/CVE-2026-42088","api":"https://cve.report/api/cve/CVE-2026-42088.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-42088","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-42088"},"summary":{"title":"OpenC3 COSMOS: Administrative Actions via the Script Runner Tool","description":"OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the openc3-COSMOS-script-runner-api container. Because all the docker containers share a network, users can execute specially crafted scripts to bypass the API permissions check and perform administrative actions, including reading and modifying data inside the Redis database, which can be used to read secrets and change COSMOS settings, as well as read and write to the buckets service, which holds configuration, log, and plugin files. These actions are normally only available from the Admin Console or with administrative privileges. Any user with permission to create and run scripts can connect to any service in the docker network. This issue has been patched in version 7.0.0-rc3.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-04 18:16:31","updated_at":"2026-05-04 20:16:19"},"problem_types":["CWE-250","CWE-250 CWE-250: Execution with Unnecessary Privileges"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"9.6","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"9.6","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0","name":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr","name":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3","name":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-42088","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42088","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"OpenC3","product":"cosmos","version":"affected < 7.0.0-rc3","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-42088","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-05-04T19:35:35.722403Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-05-04T19:36:16.686Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"cosmos","vendor":"OpenC3","versions":[{"status":"affected","version":"< 7.0.0-rc3"}]}],"descriptions":[{"lang":"en","value":"OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the openc3-COSMOS-script-runner-api container. Because all the docker containers share a network, users can execute specially crafted scripts to bypass the API permissions check and perform administrative actions, including reading and modifying data inside the Redis database, which can be used to read secrets and change COSMOS settings, as well as read and write to the buckets service, which holds configuration, log, and plugin files. These actions are normally only available from the Admin Console or with administrative privileges. Any user with permission to create and run scripts can connect to any service in the docker network. This issue has been patched in version 7.0.0-rc3."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-250","description":"CWE-250: Execution with Unnecessary Privileges","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-04T17:21:27.311Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr","tags":["x_refsource_CONFIRM"],"url":"https://github.com/OpenC3/cosmos/security/advisories/GHSA-2wvh-87g2-89hr"},{"name":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0","tags":["x_refsource_MISC"],"url":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0"},{"name":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3","tags":["x_refsource_MISC"],"url":"https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3"}],"source":{"advisory":"GHSA-2wvh-87g2-89hr","discovery":"UNKNOWN"},"title":"OpenC3 COSMOS: Administrative Actions via the Script Runner Tool"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-42088","datePublished":"2026-05-04T17:21:27.311Z","dateReserved":"2026-04-23T19:17:30.566Z","dateUpdated":"2026-05-04T19:36:16.686Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-04 18:16:31","lastModifiedDate":"2026-05-04 20:16:19","problem_types":["CWE-250","CWE-250 CWE-250: Execution with Unnecessary Privileges"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":5.8}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"42088","Ordinal":"1","Title":"OpenC3 COSMOS: Administrative Actions via the Script Runner Tool","CVE":"CVE-2026-42088","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"42088","Ordinal":"1","NoteData":"OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the openc3-COSMOS-script-runner-api container. Because all the docker containers share a network, users can execute specially crafted scripts to bypass the API permissions check and perform administrative actions, including reading and modifying data inside the Redis database, which can be used to read secrets and change COSMOS settings, as well as read and write to the buckets service, which holds configuration, log, and plugin files. These actions are normally only available from the Admin Console or with administrative privileges. Any user with permission to create and run scripts can connect to any service in the docker network. This issue has been patched in version 7.0.0-rc3.","Type":"Description","Title":"OpenC3 COSMOS: Administrative Actions via the Script Runner Tool"}]}}}