Signal K Server is a server application that runs on a central hub in a boat. Prior to 2.20.3, a path traversal vulnerability in SignalK Server's applicationData API allows authenticated users on Windows systems to read, write, and list arbitrary files and directories on the filesystem. The validateAppId() function blocks forward slashes (/) but not backslashes (\), which are treated as directory separators by path.join() on Windows. This enables attackers to escape the intended applicationData directory. This vulnerability is fixed in 2.20.3.

Project Subscriptions

Vendors Products
Microsoft Subscribe
Windows Subscribe
Signalk Subscribe
Signal K Server Subscribe
Signalk-server Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vrhw-v2hw-jffx SignalK Server has Path Traversal leading to information disclosure
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
CPEs cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows

Wed, 04 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Signalk
Signalk signal K Server
Signalk signalk-server
Vendors & Products Signalk
Signalk signal K Server
Signalk signalk-server

Mon, 02 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description Signal K Server is a server application that runs on a central hub in a boat. Prior to 2.20.3, a path traversal vulnerability in SignalK Server's applicationData API allows authenticated users on Windows systems to read, write, and list arbitrary files and directories on the filesystem. The validateAppId() function blocks forward slashes (/) but not backslashes (\), which are treated as directory separators by path.join() on Windows. This enables attackers to escape the intended applicationData directory. This vulnerability is fixed in 2.20.3.
Title SignalK Server has Path Traversal leading to information disclosure
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T21:09:42.637Z

Reserved: 2026-01-30T14:44:47.328Z

Link: CVE-2026-25228

cve-icon Vulnrichment

Updated: 2026-02-04T21:09:39.736Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-02T23:16:10.080

Modified: 2026-02-20T15:13:59.497

Link: CVE-2026-25228

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-04T12:17:53Z

Weaknesses