Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. openc3
  4. ›
  5. CVE-2025-68271

CVE-2025-68271: openc3-api Vulnerable to Unauthenticated Remote Code Execution

January 13, 2026 (updated January 14, 2026)

OpenC3 COSMOS contains a critical remote code execution vulnerability reachable through the JSON-RPC API. When a JSON-RPC request uses the string form of certain APIs, attacker-controlled parameter text is parsed into values using String#convert_to_value. For array-like inputs, convert_to_value executes eval().

Because the cmd code path parses the command string before calling authorize(), an unauthenticated attacker can trigger Ruby code execution even though the request ultimately fails authorization (401).

References

  • github.com/OpenC3/cosmos
  • github.com/OpenC3/cosmos/commit/01e9fbc5e66e9a2500b71a75a44775dd1fc2d1de
  • github.com/OpenC3/cosmos/security/advisories/GHSA-w757-4qv9-mghp
  • github.com/advisories/GHSA-w757-4qv9-mghp
  • github.com/rubysec/ruby-advisory-db/blob/master/gems/openc3/CVE-2025-68271.yml
  • nvd.nist.gov/vuln/detail/CVE-2025-68271

Code Behaviors & Features

Detect and mitigate CVE-2025-68271 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.6 before 6.10.2

Fixed versions

  • 6.10.2

Solution

Upgrade to version 6.10.2 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

Source file

gem/openc3/CVE-2025-68271.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 23 Jan 2026 00:17:02 +0000.