Description
A vulnerability was found in OpenBMB XAgent 1.0.0. This impacts the function check_user of the file XAgentServer/application/websockets/share.py of the component ShareServer WebSocket Endpoint. Performing a manipulation of the argument interaction_id results in missing authentication. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-27
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass allowing remote unauthorized access
Action: Patch immediately
AI Analysis

Impact

The vulnerability resides in the check_user function of the ShareServer WebSocket Endpoint. By manipulating the interaction_id parameter, an attacker can bypass authentication checks, enabling unauthorized users to access operations normally restricted to authenticated clients. This leads to potential unauthorized configuration changes, data exposure, or other privileged actions, classified as authentication bypass and missing authentication weaknesses (CWE‑287 and CWE‑306).

Affected Systems

OpenBMB XAgent version 1.0.0 is affected. Users running this version on any host exposing the ShareServer WebSocket Endpoint are vulnerable.

Risk and Exploitability

The CVSS base score is 6.9, reflecting a moderate to high severity. EPSS score is not available and the issue is not listed in the CISA KEV catalog, but the publicly available exploit and remote attack vector increase the likelihood of real-world exploitation. Attackers can reach the vulnerable endpoint over the network, manipulate interaction_id and gain unauthorized access. The impact ranges from configuration tampering to potential data exfiltration, depending on the operations exposed by the endpoint.

Generated by OpenCVE AI on March 27, 2026 at 17:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑supplied patch or upgrade to a fixed version of OpenBMB XAgent.
  • If no patch is available yet, restrict external network access to the ShareServer WebSocket Endpoint with firewall or IP filtering.
  • Continuously monitor logs for suspicious interaction_id values and unauthorized WebSocket connections.
  • If a patch cannot be applied in a timely manner, consider isolating or disabling the share.py endpoint until the vulnerability is resolved.

Generated by OpenCVE AI on March 27, 2026 at 17:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in OpenBMB XAgent 1.0.0. This impacts the function check_user of the file XAgentServer/application/websockets/share.py of the component ShareServer WebSocket Endpoint. Performing a manipulation of the argument interaction_id results in missing authentication. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title OpenBMB XAgent ShareServer WebSocket Endpoint share.py check_user missing authentication
First Time appeared Openbmb
Openbmb xagent
Weaknesses CWE-287
CWE-306
CPEs cpe:2.3:a:openbmb:xagent:*:*:*:*:*:*:*:*
Vendors & Products Openbmb
Openbmb xagent
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T15:09:19.380Z

Reserved: 2026-03-27T08:07:58.352Z

Link: CVE-2026-4959

cve-icon Vulnrichment

Updated: 2026-03-31T15:09:16.022Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-27T16:16:25.163

Modified: 2026-03-30T13:26:29.793

Link: CVE-2026-4959

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:01:34Z

Weaknesses