Multiple vulnerabilities have been discovered in signalk-server, a server application for boats, potentially leading to privilege escalation, data manipulation, and information disclosure. These vulnerabilities affect versions prior to 2.24.0. Users are advised to update to the latest version to mitigate these risks.
These vulnerabilities range from medium to critical, potentially allowing attackers to compromise the server.
What is Signalk Server?
CVE-2026-35038: Arbitrary Prototype Read via `from` Field Bypass
No CVSS score provided.
No EPSS score provided.
The Signal K Server is vulnerable to an arbitrary prototype read via `from` field bypass. A low-privileged authenticated user can bypass prototype boundary filtering to extract internal functions and properties from the global prototype object.
How to fix CVE-2026-35038 in signalk-server
Patch within 7 days- 1.Update signalk-server to version 2.24.0 or later.
npm update signalk-serverWorkaround: No known workaround.
NextGuard automatically flags CVE-2026-35038 if signalk-server appears in any of your monitored projects — no manual lookup required.
CVE-2026-33951: Unauthenticated Source Priorities Manipulation
No CVSS score provided.
No EPSS score provided.
The SignalK Server exposes an unauthenticated HTTP endpoint that allows remote attackers to modify navigation data source priorities. This can influence which GPS, AIS, or other sensor data sources are trusted by the system.
How to fix CVE-2026-33951 in signalk-server
Patch within 24h- 1.Update signalk-server to version 2.24.0-beta.1 or later.
npm update signalk-serverWorkaround: No known workaround.
NextGuard automatically flags CVE-2026-33951 if signalk-server appears in any of your monitored projects — no manual lookup required.
CVE-2026-34083: OAuth Authorization Code Theft via Unvalidated Host Header in OIDC Flow
Medium severity.
No EPSS score provided.
SignalK Server contains a code-level vulnerability in its OIDC login and logout handlers where the unvalidated HTTP Host header is used to construct the OAuth2 redirect_uri. An attacker can spoof the Host header to steal OAuth authorization codes and hijack user sessions.
How to fix CVE-2026-34083 in signalk-server
Patch within 24h- 1.Update signalk-server to version 2.24.0 or later.
npm update signalk-serverWorkaround: No known workaround.
NextGuard automatically flags CVE-2026-34083 if signalk-server appears in any of your monitored projects — no manual lookup required.
CVE-2026-33950: Privilege Escalation by Admin Role Injection via /enableSecurity
Critical severity.
No EPSS score provided.
An unauthenticated attacker can gain full Administrator access to the SignalK server at any time, allowing them to modify sensitive vessel routing data, alter server configurations, and access restricted endpoints. This is achieved via Admin Role Injection through the /enableSecurity endpoint.
How to fix CVE-2026-33950 in signalk-server
Patch immediately- 1.Update signalk-server to version 2.24.0-beta.4 or later.
npm update signalk-serverWorkaround: No known workaround.
NextGuard automatically flags CVE-2026-33950 if signalk-server appears in any of your monitored projects — no manual lookup required.
Stay ahead of nodejs vulnerabilities
Proactively detect and remediate vulnerabilities in your nodejs projects. Use NextGuard to monitor your nodejs dependencies.
Compare PlansFrequently asked questions
Multiple vulnerabilities were discovered in signalk-server. It is crucial to update to the latest version to mitigate these risks and ensure the security of your navigation system. You can see all nodejs vulnerabilities on our platform.
Related topics