CVE-2026-2577 PUBLISHED

Nanobot Unauthenticated WhatsApp Session Hijack via WebSocket Bridge

Assigner: tenable
Reserved: 16.02.2026 Published: 16.02.2026 Updated: 16.02.2026

The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.0.0) on port 3001 by default and does not require authentication for incoming connections. An unauthenticated remote attacker with network access to the bridge can connect to the WebSocket server to hijack the WhatsApp session. This allows the attacker to send messages on behalf of the user, intercept all incoming messages and media in real-time, and capture authentication QR codes.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
CVSS Score: 10

Product Status

Vendor HKUDS
Product nanobot
Versions Default: unaffected
  • affected from 0 to 0.1.3.Post7 (excl.)

References

Problem Types

  • CWE-306 Missing Authentication for Critical Function CWE

Impacts

  • CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs