CVE-2026-42088

OpenC3 · COSMOS

A vulnerability in the OpenC3 COSMOS Script Runner widget allows authenticated users to bypass permissions and perform administrative actions on Redis and other services.

Executive summary

A critical authorization bypass in OpenC3 COSMOS allows users to execute administrative actions, including accessing secrets and modifying system configurations.

Vulnerability

The Script Runner widget allows for the execution of Python and Ruby scripts. Because containers share a network, an attacker with script execution permissions can bypass API checks to interact directly with internal services like Redis, potentially reading secrets, changing configurations, or modifying data in the buckets service.

Business impact

With a CVSS score of 9.6, this vulnerability poses a severe threat to system integrity. An attacker can gain administrative-level control over the COSMOS platform, leading to the unauthorized disclosure of sensitive information and the potential for persistent backdoors within the system configuration.

Remediation

Immediate Action: Upgrade OpenC3 COSMOS to version 7.0.0-rc3 or later to enforce proper permissions checking.

Proactive Monitoring: Review script execution logs and monitor for unauthorized network connections to internal services like Redis from the script runner container.

Compensating Controls: Implement network segmentation between Docker containers to prevent unauthorized inter-container communication, ensuring that only necessary services can communicate with the database.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The ability to bypass administrative controls via the script runner is a critical security failure. Organizations must prioritize the patch and consider implementing stricter network isolation between microservices to prevent similar lateral movement and privilege escalation attacks.