Impact
nanobot, a personal AI assistant, contains a Cross‑Site WebSocket Hijacking flaw that was partially remedied in a prior CVE. The server runs at 127.0.0.1 on port 3001 and accepts WebSocket connections without validating the Origin header or enforcing token authentication, which remains disabled by default. An attacker can craft a webpage that a user visited while running nanobot; the webpage can open a WebSocket to the local server and gain unrestricted access to the WhatsApp Bridge API. The resulting compromise lets the attacker read messages, capture authentication QR codes, and send messages on the victim’s behalf, effectively providing remote command execution over the bridge. This weakness is listed under CWE‑1385.
Affected Systems
The vulnerability affects the HKUDS nanobot application, specifically any installation running a Bridge backend version older than 0.1.5. The affected component is the WebSocket server defined in bridge/src/server.ts. Users who have not applied the v0.1.5 release are at risk.
Risk and Exploitability
The CVSS score of 8.0 classifies the flaw as high severity. EPSS data is not available, so the exploit probability is unknown, and the issue is not currently catalogued in the CISA KEV list. Attacks require a user to be running the bridge and to visit a malicious site that initiates the WebSocket handshake; the browser does not enforce Same‑Origin Policy on WebSockets unless the server explicitly rejects cross‑origin traffic. If an attacker can trick a user into meeting these conditions, the bridge can be hijacked to perform arbitrary actions on the victim’s WhatsApp account.
OpenCVE Enrichment