PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-41893 Unknown Vendor CVE debrief

CVE-2026-41893 affects Signal K Server versions before 2.25.0. The HTTP login endpoints are rate-limited, but the WebSocket login path accepts username/password messages without the same protection, allowing repeated guessing at the pace of bcrypt verification. The issue was addressed in version 2.25.0.

Vendor
Unknown Vendor
Product
Unknown
CVSS
HIGH 8.7
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-09
Original CVE updated
2026-05-09
Advisory published
2026-05-09
Advisory updated
2026-05-09

Who should care

Operators and maintainers of Signal K Server installations, especially any deployment exposing the login-capable WebSocket interface to untrusted networks.

Technical summary

The source description says POST /login and POST /signalk/v1/auth/login are protected by express-rate-limit, with a default of 100 attempts per 10 minutes and configurable limits via HTTP_RATE_LIMITS. In contrast, the WebSocket login flow that sends {login: {username, password}} messages invokes app.securityStrategy.login() directly and does not apply rate limiting. That creates an authentication abuse path consistent with CWE-307 (excessive authentication attempts): an attacker can bypass the HTTP controls and continue password guessing over an established WebSocket connection. The patch is included in Signal K Server v2.25.0.

Defensive priority

High. This is an online authentication weakness that can materially increase password-guessing risk against exposed deployments.

Recommended defensive actions

  • Upgrade Signal K Server to version 2.25.0 or later.
  • Verify that WebSocket-based authentication follows the same rate-limiting and lockout policy as HTTP login endpoints.
  • Review HTTP_RATE_LIMITS and confirm the configured limits match your deployment risk tolerance.
  • Monitor authentication failures and repeated WebSocket login attempts for suspicious patterns.
  • If immediate upgrading is not possible, reduce exposure of login-capable interfaces to trusted networks only.

Evidence notes

The debrief is based on the CVE description and the official GitHub references listed by NVD. The description explicitly states that HTTP login endpoints are rate-limited while the WebSocket login path is not, and that version 2.25.0 contains the fix. NVD also lists CWE-307 and references the commit, pull request, release tag, and GitHub Security Advisory for corroboration. Timing context uses the CVE published/modified timestamp of 2026-05-09T20:16:27.273Z.

Official resources

Publicly disclosed and recorded on 2026-05-09; the issue is fixed in Signal K Server v2.25.0.