OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0, the Command Sender UI uses an unsafe eval() function on array-like command parameters, which allows a user-supplied payload to execute in the browser when sending a command. This creates a self-XSS risk because an attacker can trigger their own script execution in the victim’s session, if allowed to influence the array parameter input, for example via phishing. If successful, an attacker may read or modify data in the authenticated browser context, including session tokens in local storage. This issue has been patched in version 7.0.0.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 04 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openc3
Openc3 cosmos |
|
| Vendors & Products |
Openc3
Openc3 cosmos |
Mon, 04 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0, the Command Sender UI uses an unsafe eval() function on array-like command parameters, which allows a user-supplied payload to execute in the browser when sending a command. This creates a self-XSS risk because an attacker can trigger their own script execution in the victim’s session, if allowed to influence the array parameter input, for example via phishing. If successful, an attacker may read or modify data in the authenticated browser context, including session tokens in local storage. This issue has been patched in version 7.0.0. | |
| Title | OpenC3 COSMOS: Self-XSS in the Command Sender | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-04T19:47:16.828Z
Reserved: 2026-04-23T19:17:30.566Z
Link: CVE-2026-42086
No data.
Status : Received
Published: 2026-05-04T18:16:30.667
Modified: 2026-05-04T18:16:30.667
Link: CVE-2026-42086
No data.
OpenCVE Enrichment
Updated: 2026-05-04T19:00:07Z
Weaknesses