Cyber Posture

CVE-2025-68619

HighPublic PoCRCE

Published: 01 January 2026

Published
01 January 2026
Modified
06 January 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 19.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-68619 is a high-severity Code Injection (CWE-94) vulnerability in Signalk Signal K Server. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-94

Makes persistent code injection into loaded programs impossible when the executable image itself resides on hardware-protected read-only media.

addresses: CWE-94

Dynamically generated code can be produced and executed inside the isolated chamber, preventing host compromise from code-injection payloads.

addresses: CWE-94

Validates inputs used in dynamic code generation to block injected directives.

addresses: CWE-94

Directly prevents execution of attacker-supplied code written into data memory regions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct remote code execution via unsanitized input to a network-exposed REST API endpoint in server software, matching exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the appstore interface allow administrators to install npm packages through a REST API endpoint. While the endpoint validates that…

more

the package name exists in the npm registry as a known plugin or webapp, the version parameter accepts arbitrary npm version specifiers including URLs. npm supports installing packages from git repositories, GitHub shorthand syntax, and HTTP/HTTPS URLs pointing to tarballs. When npm installs a package, it can automatically execute any `postinstall` script defined in `package.json`, enabling arbitrary code execution. The vulnerability exists because npm's version specifier syntax is extremely flexible, and the SignalK code passes the version parameter directly to npm without sanitization. An attacker with admin access can install a package from an attacker-controlled source containing a malicious `postinstall` script. Version 2.19.0 contains a patch for the issue.

Deeper analysisAI

CVE-2025-68619 is a code injection vulnerability (CWE-94) in Signal K Server, an application that runs on a central hub in boats. Versions prior to 2.19.0 in the appstore interface expose a REST API endpoint that allows administrators to install npm packages. The endpoint validates that the package name exists in the npm registry as a known plugin or webapp, but the version parameter accepts arbitrary npm version specifiers, including URLs to git repositories, GitHub shorthand syntax, and HTTP/HTTPS tarballs. When npm installs such a package, it can automatically execute any postinstall script defined in package.json, enabling arbitrary code execution. The Signal K code passes the version parameter directly to npm without sanitization, with a CVSS score of 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

An attacker with administrative privileges (PR:H) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). By supplying a malicious version specifier pointing to an attacker-controlled package source containing a postinstall script, the attacker triggers arbitrary code execution on the server. This results in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the same security scope (S:U).

Signal K Server version 2.19.0 patches the issue by addressing the unsanitized version parameter handling. Additional details are available in the security advisory at https://github.com/SignalK/signalk-server/security/advisories/GHSA-93jc-vqqc-vvvh and the release notes at https://github.com/SignalK/signalk-server/releases/tag/v2.19.0.

Details

CWE(s)

Affected Products

signalk
signal k server
2.19.0 · ≤ 2.19.0

CVEs Like This One

CVE-2026-33951Same product: Signalk Signal K Server
CVE-2025-66398Same product: Signalk Signal K Server
CVE-2025-68620Same product: Signalk Signal K Server
CVE-2026-33950Same product: Signalk Signal K Server
CVE-2026-23515Same product: Signalk Signal K Server
CVE-2025-69203Same product: Signalk Signal K Server
CVE-2025-68272Same product: Signalk Signal K Server
CVE-2026-39320Same product: Signalk Signal K Server
CVE-2025-23209Shared CWE-94
CVE-2026-39440Shared CWE-94

References