Home

Description

The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.0.0) on port 3001 by default and does not require authentication for incoming connections. An unauthenticated remote attacker with network access to the bridge can connect to the WebSocket server to hijack the WhatsApp session. This allows the attacker to send messages on behalf of the user, intercept all incoming messages and media in real-time, and capture authentication QR codes.

PUBLISHED Reserved 2026-02-16 | Published 2026-02-16 | Updated 2026-02-17 | Assigner tenable




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

Any version before 0.1.3.Post7
affected

References

www.tenable.com/security/research/tra-2026-09

github.com/HKUDS/nanobot/releases/tag/v0.1.3.post7

cve.org (CVE-2026-2577)

nvd.nist.gov (CVE-2026-2577)

Download JSON