Cyber Posture

CVE-2026-42088

Critical

Published: 04 May 2026

Published
04 May 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 9.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
EPSS Score 0.0002 6.6th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the openc3-COSMOS-script-runner-api container.…

more

Because all the docker containers share a network, users can execute specially crafted scripts to bypass the API permissions check and perform administrative actions, including reading and modifying data inside the Redis database, which can be used to read secrets and change COSMOS settings, as well as read and write to the buckets service, which holds configuration, log, and plugin files. These actions are normally only available from the Admin Console or with administrative privileges. Any user with permission to create and run scripts can connect to any service in the docker network. This issue has been patched in version 7.0.0-rc3.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-250

Policy promotes least privilege by defining necessary privileges and management commitment to them.

addresses: CWE-250

Supervision detects and allows removal of unnecessary privileges that enable execution with excess rights.

addresses: CWE-250

Reviewing accounts for compliance, disabling/removing unneeded accounts, and aligning with termination processes prevents execution with unnecessary privileges.

addresses: CWE-250

Separation of duties prevents any single user from holding all privileges needed to complete a critical task, directly reducing execution with unnecessary privileges.

addresses: CWE-250

Directly prevents execution with more privileges than needed for assigned tasks.

addresses: CWE-250

Role-based training on least privilege principles reduces the chance personnel assign or retain unnecessary privileges.

addresses: CWE-250

Analysis of audit records can identify execution with unnecessary privileges through unusual activity patterns.

addresses: CWE-250

Automatic termination after a defined period eliminates unnecessary privileges from persistent connections.

Security SummaryAI

CVE-2026-42088 is a high-severity vulnerability (CVSS 9.6, AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N) affecting OpenC3 COSMOS prior to version 7.0.0-rc3. The issue resides in the Script Runner widget within the openc3-COSMOS-script-runner-api Docker container, which enables users to execute Python and Ruby scripts. Due to all Docker containers sharing a network, these scripts can bypass API permissions checks, allowing unauthorized access to other services.

Any authenticated user with permission to create and run scripts can exploit this vulnerability remotely over the network. Successful exploitation grants administrative capabilities normally restricted to the Admin Console, including reading and modifying data in the Redis database to access secrets and alter COSMOS settings, as well as reading and writing to the buckets service containing configuration, log, and plugin files.

The vulnerability has been addressed in OpenC3 COSMOS version 7.0.0-rc3, as detailed in the project's release notes and GitHub Security Advisory GHSA-2wvh-87g2-89hr. Security practitioners should upgrade to the patched version to mitigate the risk, associated with CWE-250 (Execution with Unnecessary Privileges).

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

Vuln enables Python script execution (T1059.006) in shared Docker network to bypass API checks for privilege escalation to admin (T1068), direct access to Redis secrets (T1552), and data from DB/bucket repositories (T1213.006).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

References