


Perceptive Security
SOC/SIEM Consultancy

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.25.0 are vulnerable to an unauthenticated Regular Expression D…
Published:
20 april 2026 om 22:00:00
Alert date:
21 april 2026 om 17:05:49
Source:
nvd.nist.gov
Mobile & IoT, Web Technologies
Signal K Server versions prior to 2.25.0 contain an unauthenticated Regular Expression Denial of Service (ReDoS) vulnerability in WebSocket subscription handling logic. Attackers can inject unescaped regex metacharacters into the context parameter of stream subscriptions, causing catastrophic backtracking loops in the Node.js event loop. This results in complete server denial of service with 100% CPU usage and total unresponsiveness to API or socket requests. The vulnerability affects the server's self UUID evaluation process. Version 2.25.0 contains a fix for this critical issue.
Technical details
Mitigation steps:
Affected products:
Signal K Server
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-39320
https://github.com/SignalK/signalk-server/commit/215d81eb700d5419c3396a0fbf23f2e246dfac2d
https://github.com/SignalK/signalk-server/pull/2568
https://github.com/SignalK/signalk-server/releases/tag/v2.25.0
https://github.com/SignalK/signalk-server/security/advisories/GHSA-7gcj-phff-2884
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
