Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-793v-589g-574v | Bokeh server applications have Incomplete Origin Validation in WebSockets |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 08 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 08 Jan 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bokeh is an interactive visualization library written in Python. In versions 3.8.1 and below, if a server is configured with an allowlist (e.g., dashboard.corp), an attacker can register a domain like dashboard.corp.attacker.com (or use a subdomain if applicable) and lure a victim to visit it. The malicious site can then initiate a WebSocket connection to the vulnerable Bokeh server. Since the Origin header (e.g., http://dashboard.corp.attacker.com/) matches the allowlist according to the flawed logic, the connection is accepted. Once connected, the attacker can interact with the Bokeh server on behalf of the victim, potentially accessing sensitive data, or modifying visualizations. This issue is fixed in version 3.8.2. | |
| Title | Bokeh server applications have Incomplete Origin Validation in WebSockets | |
| Weaknesses | CWE-1385 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-08T16:41:19.624Z
Reserved: 2026-01-05T17:24:36.928Z
Link: CVE-2026-21883
Updated: 2026-01-08T16:41:15.118Z
Status : Awaiting Analysis
Published: 2026-01-08T02:15:53.950
Modified: 2026-01-08T18:08:18.457
Link: CVE-2026-21883
OpenCVE Enrichment
No data.
Github GHSA