An unprotected WebSocket connection in the latest version of stitionai/devika (commit ecee79f) allows a malicious website to connect to the backend and issue commands on behalf of the user. The backend serves all listeners on the given socket, enabling any such malicious website to intercept all communication between the user and the backend. This vulnerability can lead to unauthorized command execution and potential server-side request forgery.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00174}

epss

{'score': 0.00353}


Tue, 15 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Stitionai
Stitionai devika
CPEs cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
Vendors & Products Stitionai
Stitionai devika
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-27T18:40:57.321Z

Updated: 2024-08-01T21:25:02.832Z

Reserved: 2024-06-10T20:51:54.485Z

Link: CVE-2024-5820

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:02.832Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-27T19:15:16.640

Modified: 2025-07-15T15:36:35.507

Link: CVE-2024-5820

cve-icon Redhat

No data.