CVE-2026-41893
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
09/05/2026
Last modified:
15/05/2026
Description
Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.25.0, the HTTP login endpoints (POST /login and POST /signalk/v1/auth/login) are protected by express-rate-limit (default: 100 attempts per 10-minute window, configurable via HTTP_RATE_LIMITS). The WebSocket login path — sending {login: {username, password}} messages over an established WebSocket connection — calls app.securityStrategy.login() directly without any rate limiting. An attacker can bypass HTTP rate limiting entirely by opening a WebSocket connection and attempting unlimited password guesses at the speed bcrypt allows (~20 attempts/sec with 10 salt rounds). This issue has been patched in version 2.25.0.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:* | 2.25.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/SignalK/signalk-server/commit/215d81eb700d5419c3396a0fbf23f2e246dfac2d
- https://github.com/SignalK/signalk-server/pull/2568
- https://github.com/SignalK/signalk-server/releases/tag/v2.25.0
- https://github.com/SignalK/signalk-server/security/advisories/GHSA-vmfm-ch9h-5c7g
- https://github.com/SignalK/signalk-server/security/advisories/GHSA-vmfm-ch9h-5c7g



