Execution with Unnecessary Privileges Affecting openc3 package, versions <7.0.0-rc3


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUBY-OPENC3-16416456
  • published4 May 2026
  • disclosed23 Apr 2026
  • creditsuffs811

Introduced: 23 Apr 2026

NewCVE-2026-42088  (opens in a new tab)
CWE-250  (opens in a new tab)

How to fix?

Upgrade openc3 to version 7.0.0-rc3 or higher.

Overview

Affected versions of this package are vulnerable to Execution with Unnecessary Privileges through the run_script.py and run_script.rb script execution paths in the script runner components. An attacker can read sensitive credentials by running a script that prints the process environment, exposing Redis, API, service, TSDB, and bucket secrets to anyone who can view the script output. This leaks authentication material from the running script process and can let an attacker reuse those credentials to access backend services and data.

CVSS Base Scores

version 4.0
version 3.1