CVE-2026-42084
HIGHOpenC3 COSMOS: Hijacked session token can be used to reset password for persistence
Title source: cnaDescription
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to versions 6.10.5 and 7.0.0-rc3, the OpenC3 password change functionality allows a user to change their password without providing the old password, by accepting a valid session token instead. In assumed breach scenarios, this behaviour can be exploited by an attacker who has already obtained a valid session token, to gain persistence in hijacked account (including admin) and prevent legitimate users from accessing the account. This issue has been patched in versions 6.10.5 and 7.0.0-rc3.
References (4)
Core 4
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/OpenC3/cosmos/security/advisories/GHSA-wgx6-g857-jjf7
X_Refsource_Misc x_refsource_misc
https://github.com/OpenC3/cosmos/commit/2e623714e3426d5ae81b6f8239d4a2a6937ef776
X_Refsource_Misc x_refsource_misc
https://github.com/OpenC3/cosmos/releases/tag/v6.10.5
X_Refsource_Misc x_refsource_misc
https://github.com/OpenC3/cosmos/releases/tag/v7.0.0-rc3
Scores
CVSS v3
8.1
EPSS
0.0003
EPSS Percentile
7.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-620
Status
published
Products (3)
OpenC3/cosmos
< 6.10.5
OpenC3/cosmos
>= 7.0.0.pre.rc1, < 7.0.0-rc3
rubygems/openc3
0 - 6.10.5RubyGems
Published
May 04, 2026
Tracked Since
May 04, 2026