An unprotected WebSocket connection in the latest version of stitionai/devika (commit ecee79f) allows a malicious website to connect to the backend and issue commands on behalf of the user. The backend serves all listeners on the given socket, enabling any such malicious website to intercept all communication between the user and the backend. This vulnerability can lead to unauthorized command execution and potential server-side request forgery.
References
Link | Resource |
---|---|
https://huntr.com/bounties/2ba757bf-8ede-445b-b143-2de7769758a6 | Exploit Third Party Advisory |
https://huntr.com/bounties/2ba757bf-8ede-445b-b143-2de7769758a6 | Exploit Third Party Advisory |
Configurations
History
15 Jul 2025, 15:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/2ba757bf-8ede-445b-b143-2de7769758a6 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:* | |
First Time |
Stitionai
Stitionai devika |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
Information
Published : 2024-06-27 19:15
Updated : 2025-07-15 15:36
NVD link : CVE-2024-5820
Mitre link : CVE-2024-5820
CVE.ORG link : CVE-2024-5820
JSON object : View
Products Affected
stitionai
- devika
CWE
CWE-862
Missing Authorization