Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

The National Vulnerability Database (NVD) recently disclosed a critical Cross-Site WebSocket Hijacking (CSWSH) vulnerability, CVE-2026-35589, impacting ‘nanobot’ – a personal AI assistant. This flaw, present in versions prior to 0.1.5, stems from an incomplete fix for a previous vulnerability, CVE-2026-2577. Specifically, the bridge’s WebSocket server (located in bridge/src/server.ts) fails to adequately validate the Origin header during the WebSocket handshake.

While the original remediation attempted to mitigate the issue by binding the server to 127.0.0.1 and introducing an optional BRIDGE_TOKEN parameter, the token authentication is disabled by default. This oversight is a major miss, as browsers, by design, don’t enforce the Same-Origin Policy on WebSockets unless explicitly denied by the server. Consequently, any malicious website a user visits can establish a WebSocket connection to ws://127.0.0.1:3001/ and gain unfettered access to the bridge API. This isn’t just a theoretical exploit; the NVD reports that an attacker could hijack WhatsApp sessions, snoop on incoming messages, pilfer authentication QR codes, and even send messages on behalf of the compromised user. This is a high-severity issue, rated 8.0 on the CVSS scale, and has been addressed in version 0.1.5.

Related ATT&CK Techniques

🛡️ Detection Rules

5 rules · 5 SIEM formats

5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

medium T1189 Initial Access

Drive-by Download via Browser — CVE-2026-35589

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-35589 Cross-Site WebSocket Hijacking nanobot versions prior to 0.1.5
CVE-2026-35589 Cross-Site WebSocket Hijacking Vulnerable component: bridge's WebSocket server in bridge/src/server.ts
CVE-2026-35589 Cross-Site WebSocket Hijacking Attack vector: WebSocket connection to ws://127.0.0.1:3001/
CVE-2026-35589 Cross-Site WebSocket Hijacking Affected functionality: Lack of Origin header validation during WebSocket handshake
CVE-2026-35589 Cross-Site WebSocket Hijacking Related vulnerability: CVE-2026-2577 (incomplete remediation)

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Jellyfin RCE: Critical Flaw Chains Arbitrary File Write to Root

CVE-2026-35031 — Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the subtitle upload endpoint (POST...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22cwe-187
/CRITICAL /⚑ 5 IOCs