OpenC3 COSMOS is Vulnerable to Self-XSS Through the Command Sender
Published: April 22, 2026
SECURITY IDENTIFIERS
- CVE: CVE-2026-42086 (NVD)
- GHSA: GHSA-ffq5-qpvf-xq7x
- Vendor Advisory: https://github.com/OpenC3/cosmos/security/advisories/GHSA-ffq5-qpvf-xq7x
GEM
SEVERITY
CVSS v3.x: 4.6 (Medium)
PATCHED VERSIONS
>= 7.0.0
DESCRIPTION
Summary
The Command Sender UI uses an unsafe eval() function on array-like
command parameters, which allows a user-supplied payload to execute
in the browser when sending a command. This creates a self-XSS risk
because an attacker can trigger their own script execution in the
victim’s session, if allowed to influence the array parameter input,
for example via phishing. If successful, an attacker may read or
modify data in the authenticated browser context, including session
tokens in local storage.
Details
The unsafe eval() usage on user-supplied ARRAY parameters happens
in convertToValue method in CommandSender.vue
Impact
Local JavaScript execution in the user's browser.
