Vulnerabilities/

Signal K Server Vulnerable to Access Request Spoofing

Severity:
Medium

Description

The SignalK access request system has two related features that when combined by themselves and with the infromation disclosure vulnerability enable convincing social engineering attacks against administrators.

When a device creates an access request, it specifies three fields: clientId, description, and permissions.

Recommendation

Update the signalk-server package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
signalk-server
Anything's wrong? Let us know Last updated on January 02, 2026