An unprotected WebSocket connection in the latest version of stitionai/devika (commit ecee79f) allows a malicious website to connect to the backend and issue commands on behalf of the user. The backend serves all listeners on the given socket, enabling any such malicious website to intercept all communication between the user and the backend. This vulnerability can lead to unauthorized command execution and potential server-side request forgery.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Stitionai
Stitionai devika |
|
CPEs | cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Stitionai
Stitionai devika |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-27T18:40:57.321Z
Updated: 2024-08-01T21:25:02.832Z
Reserved: 2024-06-10T20:51:54.485Z
Link: CVE-2024-5820

Updated: 2024-08-01T21:25:02.832Z

Status : Analyzed
Published: 2024-06-27T19:15:16.640
Modified: 2025-07-15T15:36:35.507
Link: CVE-2024-5820

No data.