Impact
A flaw in the WebSocket Endpoint of OpenBMB XAgent allows an attacker to modify the interaction_id parameter sent to ReplayServer.send_data. Proper authorization checks are bypassed, giving the attacker the same privileges as a legitimate user and enabling the replay of protected data. The vulnerability is represented by weaknesses in authentication and authorization logic (CWE-285, CWE-639).
Affected Systems
The exposed defect exists in OpenBMB XAgent version 1.0.0. No other product or version information is documented as vulnerable.
Risk and Exploitability
The publicly assessed CVSS score of 2.3 denotes low overall severity, yet the flaw can be exploited over the network and the attack path is considered difficult. No EPSS score is published and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalogue. Despite the low numerical score, the ability to bypass authentication poses a non‑negligible threat to confidentiality and integrity of the XAgent replay services, especially if the WebSocket endpoint remains reachable from untrusted networks.
OpenCVE Enrichment