RubySec

Providing security resources for the Ruby community

GHSA-2wvh-87g2-89hr (openc3): OpenC3 COSMOS - Permissions Bypass Provides User Access to Unassigned Administrative Actions via Script Runner Tool

OpenC3 COSMOS - Permissions Bypass Provides User Access to Unassigned Administrative Actions via Script Runner Tool

Published: April 23, 2026

SECURITY IDENTIFIERS

GEM

openc3

SEVERITY

CVSS v3.x: 9.6 (Critical)

PATCHED VERSIONS

>= 7.0.0

DESCRIPTION

Vulnerability Type: Execution with Unnecessary Privileges Attack type: Authenticated remote

Impact: Data disclosure/manipulation, privilege escalation

Affected components:

  • The following docker images: Openc3inc/openc3-COSMOS-script-runner-api

The Script Runner widget allows users to execute Python and Ruby scripts directly from the openc3-COSMOS-script-runner-api container. Because all the docker containers share a network, users can execute specially crafted scripts to bypass the API permissions check and perform administrative actions, including reading and modifying data inside the Redis database, which can be used to read secrets and change COSMOS settings, as well as read and write to the buckets service, which holds configuration, log,and plugin files. These actions are normally only available from the Admin Console or with administrative privileges. Any user with permission to create and run scripts can connect to any service in the docker network.

Recommendations

  • Limit the permissions of the script runner API to prevent lower level users from performing administrative actions.

RELATED