WebSocket App unauthenticated hijack (CVE-2026-25851)
CVE-2026-25851
Attackers hijack WebSocket sessions without login, enabling full account takeover and data theft. Update to the latest patched version immediately.
Patch now - CVE-2026-25851 is a critical authentication bypass in OCPP WebSocket endpoints that lets an attacker impersonate any charging station without credentials, gaining control over charging sessions, pricing, and network commands. Immediate patching is required to prevent service disruption and unauthorized access.
Overview
A critical security flaw has been identified in the implementation of WebSocket endpoints used for OCPP (Open Charge Point Protocol) communications. This vulnerability allows an attacker to impersonate any charging station on the network without requiring a password or any form of authentication.
Vulnerability Explained
In simple terms, the system designed to communicate with electric vehicle chargers is missing a critical verification step. It’s like a building security system that lets anyone claim to be an employee if they simply shout a known name at the door, without ever checking an ID badge.
An attacker can connect to the charging network’s communication port using a charging station’s identifier (which can often be discovered or guessed). Once connected, the system fully trusts this connection, allowing the attacker to send false data to the central management system or even send malicious commands directly to impersonate a real charger.
Potential Impact
The consequences of this vulnerability are severe for charging network operators and their customers:
- Unauthorized Control: Attackers could remotely start or stop charging sessions, manipulate pricing, or disable charging stations.
- Data Corruption: False usage data, error reports, or meter values can be sent to the backend, disrupting billing, reporting, and grid management.
- Privilege Escalation: By impersonating a station, an attacker gains the system’s trust, potentially using this position to attack other, more sensitive parts of the network.
- Service Disruption: Widespread malicious commands could lead to a loss of service across the charging network.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Remediation: Apply vendor-provided patches or updates that implement proper authentication for all WebSocket connections. This typically involves enforcing certificate-based authentication (using TLS client certificates) or robust shared secret mechanisms as mandated by the OCPP standard.
Immediate Mitigations (If a Patch is Not Yet Available):
- Network Segmentation: Isolate the charging station network (the “OT network”) from corporate and public internet networks using firewalls. Only allow necessary communication paths to the specific backend servers.
- Access Control Lists (ACLs): Implement firewall rules or WebSocket gateway rules to restrict incoming WebSocket connections to known, legitimate source IP addresses, where feasible. This is not a complete fix but can reduce the attack surface.
- Monitoring and Logging: Increase logging for all WebSocket connection attempts and OCPP message traffic. Alert on any connection attempts from unexpected IP addresses or the use of duplicate station identifiers from multiple locations.
Operators should contact their charging management software or hardware vendor to confirm their system’s status and obtain the necessary security updates.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers ...
OpenCATS 0.9.4 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by uploading malicious PHP files disguised as resume attachments. Atta...
Vvveb before version 1.0.8.2 contains a hard-coded credentials vulnerability in its docker-compose-apache.yaml configuration that allows unauthenticated attackers to access the bundled phpMyAdmin cont...
Arelle before 2.39.10 contains an unauthenticated remote code execution vulnerability in the /rest/configure REST endpoint that accepts a plugins query parameter and forwards it to the plugin manager ...