CVE-2026-42084 PUBLISHED

OpenC3 COSMOS: Hijacked session token can be used to reset password for persistence

Assigner: GitHub_M
Reserved: 23.04.2026 Published: 04.05.2026 Updated: 04.05.2026

OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to versions 6.10.5 and 7.0.0-rc3, the OpenC3 password change functionality allows a user to change their password without providing the old password, by accepting a valid session token instead. In assumed breach scenarios, this behaviour can be exploited by an attacker who has already obtained a valid session token, to gain persistence in hijacked account (including admin) and prevent legitimate users from accessing the account. This issue has been patched in versions 6.10.5 and 7.0.0-rc3.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 8.1

Product Status

Vendor OpenC3
Product cosmos
Versions
  • Version < 6.10.5 is affected
  • Version >= 7.0.0.pre.rc1, < 7.0.0-rc3 is affected

References

Problem Types

  • CWE-620: Unverified Password Change CWE