CVE-2026-35038 in signalk-server
요약 (영어)
Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0, there is an arbitrary prototype read vulnerability via `from` field bypass. This vulnerability allows a low-privileged authenticated user to bypass prototype boundary filtering to extract internal functions and properties from the global prototype object this violates data isolation and lets a user read more than they should. This issue has been patched in version 2.24.0.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
책임이 있는
GitHub_M
예약하다
2026. 03. 31.
공개
2026. 04. 02.
상태
확인됨
엔트리
VulDB provides additional information and datapoints for this CVE:
| 아이디 | 취약성 | CWE | 악용 | 대책 | CVE |
|---|---|---|---|---|---|
| 354940 | SignalK signalk-server 정보 공개 | 200 | 개념 증명 | 공식 수정 | CVE-2026-35038 |