CVE-2025-68619

Signal K RCE: How a Malicious npm Package Can Sink Your Boat

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 2, 2026·6 min read·4 visits

Executive Summary (TL;DR)

Authenticated administrators can achieve Remote Code Execution (RCE) on Signal K Server versions prior to 2.19.0. The vulnerability exists because the server passes unsanitized user input directly to `npm install`, allowing an attacker to specify a remote URL instead of a semantic version. This triggers the download of a malicious package and the immediate execution of its `postinstall` scripts.

Signal K Server, the open-source hub for marine data, contained a Remote Code Execution (RCE) vulnerability in its plugin management system. By failing to validate version strings passed to the npm installer, the server allowed authenticated administrators to trick the system into downloading and executing malicious packages from arbitrary URLs.

Fix Analysis (1)

Technical Appendix

CVSS Score
7.3/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS Probability
0.07%
Top 100% most exploited

Affected Systems

Signal K Server < 2.19.0

Affected Versions Detail

Product
Affected Versions
Fixed Version
Signal K Server
Signal K
< 2.19.02.19.0
AttributeDetail
Attack VectorNetwork (Authenticated API)
ImpactRemote Code Execution (RCE)
CVSS v4.07.3 (High)
CWE IDCWE-94 (Improper Control of Generation of Code)
ComponentPlugin Management / npm wrapper
PrerequisitesAdmin Credentials
CWE-94
Improper Control of Generation of Code ('Code Injection')

The product allows user input to control or influence the generation of code that is then executed by the system.

Vulnerability Timeline

Patch Commit Merged
2025-02-14
Version 2.19.0 Released
2025-02-14
CVE Published
2025-02-18