Komari is a lightweight, self-hosted server monitoring tool designed to provide a simple and efficient solution for monitoring server performance. Prior to 1.0.4-fix1, WebSocket upgrader has disabled origin checking, enabling Cross-Site WebSocket Hijacking (CSWSH) attacks against authenticated users. Any third party website can send requests to the terminal websocket endpoint with browser's cookies, resulting in remote code execution. This vulnerability is fixed in 1.0.4-fix1.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Aug 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 18 Aug 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Komari is a lightweight, self-hosted server monitoring tool designed to provide a simple and efficient solution for monitoring server performance. Prior to 1.0.4-fix1, WebSocket upgrader has disabled origin checking, enabling Cross-Site WebSocket Hijacking (CSWSH) attacks against authenticated users. Any third party website can send requests to the terminal websocket endpoint with browser's cookies, resulting in remote code execution. This vulnerability is fixed in 1.0.4-fix1. | |
| Title | Komari Allows Cross-site WebSocket Hijacking | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-18T17:41:37.372Z
Updated: 2025-08-18T17:52:19.481Z
Reserved: 2025-08-12T16:15:30.238Z
Link: CVE-2025-55300
Updated: 2025-08-18T17:52:10.871Z
Status : Awaiting Analysis
Published: 2025-08-18T18:15:40.250
Modified: 2025-08-18T20:16:28.750
Link: CVE-2025-55300
No data.