Komari is a lightweight, self-hosted server monitoring tool designed to provide a simple and efficient solution for monitoring server performance. Prior to 1.0.4-fix1, WebSocket upgrader has disabled origin checking, enabling Cross-Site WebSocket Hijacking (CSWSH) attacks against authenticated users. Any third party website can send requests to the terminal websocket endpoint with browser's cookies, resulting in remote code execution. This vulnerability is fixed in 1.0.4-fix1.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 18 Aug 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Komari is a lightweight, self-hosted server monitoring tool designed to provide a simple and efficient solution for monitoring server performance. Prior to 1.0.4-fix1, WebSocket upgrader has disabled origin checking, enabling Cross-Site WebSocket Hijacking (CSWSH) attacks against authenticated users. Any third party website can send requests to the terminal websocket endpoint with browser's cookies, resulting in remote code execution. This vulnerability is fixed in 1.0.4-fix1. | |
Title | Komari Allows Cross-site WebSocket Hijacking | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-18T17:41:37.372Z
Updated: 2025-08-18T17:52:19.481Z
Reserved: 2025-08-12T16:15:30.238Z
Link: CVE-2025-55300

Updated: 2025-08-18T17:52:10.871Z

Status : Awaiting Analysis
Published: 2025-08-18T18:15:40.250
Modified: 2025-08-18T20:16:28.750
Link: CVE-2025-55300

No data.