The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.0.0) on port 3001 by default and does not require authentication for incoming connections. An unauthenticated remote attacker with network access to the bridge can connect to the WebSocket server to hijack the WhatsApp session. This allows the attacker to send messages on behalf of the user, intercept all incoming messages and media in real-time, and capture authentication QR codes.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.0.0) on port 3001 by default and does not require authentication for incoming connections. An unauthenticated remote attacker with network access to the bridge can connect to the WebSocket server to hijack the WhatsApp session. This allows the attacker to send messages on behalf of the user, intercept all incoming messages and media in real-time, and capture authentication QR codes. | |
| Title | Nanobot Unauthenticated WhatsApp Session Hijack via WebSocket Bridge | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-02-16T09:51:11.375Z
Reserved: 2026-02-16T09:39:50.906Z
Link: CVE-2026-2577
No data.
Status : Received
Published: 2026-02-16T10:16:08.827
Modified: 2026-02-16T10:16:08.827
Link: CVE-2026-2577
No data.
OpenCVE Enrichment
No data.