Description
OpenViking prior to version 0.3.9 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with network access to the exposed service can invoke privileged bot-control functionality without providing a valid X-API-Key header, including submitting attacker-controlled prompts, creating or using bot sessions, and accessing downstream tools, integrations, secrets, or data accessible to the bot.
Published: 2026-04-17
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Authentication Bypass allowing unauthorized bot control
Action: Patch
AI Analysis

Impact

OpenViking prior to version 0.3.9 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. This absence of authentication corresponds to CWE‑636 and permits any user to invoke privileged bot‑control functionality without supplying a valid X‑API‑Key header, including submitting attacker‑controlled prompts, creating or using bot sessions, and accessing downstream tools, integrations, secrets, or data accessible to the bot.

Affected Systems

The vulnerability affects OpenViking deployments by Volcengine that use any version released before the commit c7bb1676. The exposed HTTP routes of the VikingBot OpenAPI allow unrestricted access to bot functionalities and any downstream tools, integrations, secrets, or data the bot can reach.

Risk and Exploitability

The CVSS score of 9.1 indicates high severity. The EPSS score of 0.00109 (approximately 0.109%) indicates an extremely low probability of exploitation, but the absence of a blocking check makes exploitation straightforward for attackers with network reach to the exposed service. Because the vulnerability is not listed in the CISA KEV catalog and no known exploits are publicly disclosed yet, the likelihood of immediate exploitation is uncertain, yet the potential impact of unauthorized bot actions remains high. Attackers would likely target the open route via standard HTTP requests, bypassing authentication entirely.

Generated by OpenCVE AI on April 22, 2026 at 03:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenViking to a version that includes the commit c7bb1676 which enforces the api_key presence
  • Configure a non‑empty api_key value in the OpenViking settings to enable authentication enforcement
  • Restrict network access to the VikingBot OpenAPI endpoints using firewall rules or network segmentation

Generated by OpenCVE AI on April 22, 2026 at 03:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jgq2-vq69-gr6h OpenViking: Unauthenticated remote bot control via OpenAPI HTTP routes
History

Tue, 05 May 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:volcengine:openviking:*:*:*:*:*:*:*:*

Tue, 21 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description OpenViking prior to commit c7bb167 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with network access to the exposed service can invoke privileged bot-control functionality without providing a valid X-API-Key header, including submitting attacker-controlled prompts, creating or using bot sessions, and accessing downstream tools, integrations, secrets, or data accessible to the bot. OpenViking prior to version 0.3.9 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with network access to the exposed service can invoke privileged bot-control functionality without providing a valid X-API-Key header, including submitting attacker-controlled prompts, creating or using bot sessions, and accessing downstream tools, integrations, secrets, or data accessible to the bot.
Title OpenViking Authentication Bypass via VikingBot OpenAPI OpenViking < 0.3.9 Authentication Bypass via VikingBot OpenAPI
References

Mon, 20 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Volcengine
Volcengine openviking
Vendors & Products Volcengine
Volcengine openviking

Fri, 17 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description OpenViking prior to commit c7bb167 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with network access to the exposed service can invoke privileged bot-control functionality without providing a valid X-API-Key header, including submitting attacker-controlled prompts, creating or using bot sessions, and accessing downstream tools, integrations, secrets, or data accessible to the bot.
Title OpenViking Authentication Bypass via VikingBot OpenAPI
Weaknesses CWE-636
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 9.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Volcengine Openviking
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-21T13:34:32.327Z

Reserved: 2026-04-13T20:29:02.810Z

Link: CVE-2026-40525

cve-icon Vulnrichment

Updated: 2026-04-20T13:45:05.750Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-17T19:16:39.017

Modified: 2026-05-05T18:06:02.667

Link: CVE-2026-40525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T03:45:06Z

Weaknesses