RubySec

Providing security resources for the Ruby community

CVE-2026-42086 (openc3): OpenC3 COSMOS is Vulnerable to Self-XSS Through the Command Sender

OpenC3 COSMOS is Vulnerable to Self-XSS Through the Command Sender

Published: April 22, 2026

SECURITY IDENTIFIERS

GEM

openc3

SEVERITY

CVSS v3.x: 4.6 (Medium)

PATCHED VERSIONS

>= 7.0.0

DESCRIPTION

Summary

The Command Sender UI uses an unsafe eval() function on array-like command parameters, which allows a user-supplied payload to execute in the browser when sending a command. This creates a self-XSS risk because an attacker can trigger their own script execution in the victim’s session, if allowed to influence the array parameter input, for example via phishing. If successful, an attacker may read or modify data in the authenticated browser context, including session tokens in local storage.

Details

The unsafe eval() usage on user-supplied ARRAY parameters happens in convertToValue method in CommandSender.vue

Impact

Local JavaScript execution in the user's browser.

RELATED