CVE-2022-31149: CWE-290: Authentication Bypass by Spoofing in ActivityWatch activitywatch
ActivityWatch open-source automated time tracker. Versions prior to 0.12.0b2 are vulnerable to DNS rebinding attacks. This vulnerability impacts everyone running ActivityWatch and gives the attacker full access to the ActivityWatch REST API. Users should upgrade to v0.12.0b2 or later to receive a patch. As a workaround, block DNS lookups that resolve to 127.0.0.1.
AI Analysis
Technical Summary
CVE-2022-31149 is a medium-severity vulnerability affecting ActivityWatch, an open-source automated time tracking application. Versions prior to 0.12.0b2 are vulnerable to DNS rebinding attacks, which allow an attacker to bypass authentication mechanisms by spoofing the origin of requests. Specifically, this vulnerability enables an attacker to gain unauthorized full access to the ActivityWatch REST API. DNS rebinding attacks exploit the way browsers enforce same-origin policies by manipulating DNS responses to resolve a domain name to a local IP address (127.0.0.1), thereby tricking the browser into sending requests to local services that are normally inaccessible from the web. Since ActivityWatch exposes a REST API locally, an attacker can leverage this flaw to interact with the API as if they were a trusted local user, bypassing authentication controls (CWE-290). The vulnerability affects all users running vulnerable versions of ActivityWatch prior to 0.12.0b2. The recommended remediation is to upgrade to version 0.12.0b2 or later, which includes a patch to mitigate the DNS rebinding attack vector. As a temporary workaround, blocking DNS lookups that resolve to 127.0.0.1 can reduce exposure by preventing the attacker's domain from resolving to the local loopback address. There are no known exploits in the wild at this time, but the vulnerability presents a significant risk due to the potential for unauthorized access to user activity data and control over the time tracking application.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which ActivityWatch is deployed within their environments. ActivityWatch is primarily used for personal productivity tracking and may be adopted by individuals or teams within organizations. If exploited, an attacker could gain unauthorized access to sensitive user activity data, potentially exposing confidential information about employee behavior, project timelines, or productivity metrics. Furthermore, unauthorized control over the REST API could allow manipulation or deletion of tracking data, impacting data integrity and availability. In environments where ActivityWatch is integrated with other internal tools or workflows, this could lead to broader operational disruptions. Although the vulnerability requires local network access or a user to visit a malicious website, the ease of exploitation via DNS rebinding makes it a credible threat, especially in organizations with less restrictive network policies or where users frequently access untrusted web content. The confidentiality and integrity of user data are the primary concerns, with availability also potentially affected if the API is manipulated maliciously. Given the medium severity and the nature of the vulnerability, organizations should treat this as a moderate risk that warrants prompt remediation to prevent potential data leakage or operational interference.
Mitigation Recommendations
1. Upgrade all instances of ActivityWatch to version 0.12.0b2 or later immediately to apply the official patch that mitigates the DNS rebinding vulnerability. 2. Implement network-level controls to block DNS responses that resolve to 127.0.0.1 or other local IP addresses from untrusted domains, effectively preventing DNS rebinding attempts. 3. Configure browser security settings or use browser extensions that can detect and block DNS rebinding attacks, especially for users who run ActivityWatch locally. 4. Educate users about the risks of visiting untrusted websites while running ActivityWatch, as user interaction is required to trigger the attack via malicious web content. 5. Monitor network traffic for suspicious DNS queries or unusual API access patterns to detect potential exploitation attempts. 6. If feasible, isolate ActivityWatch instances within segmented network zones to limit exposure to external web traffic. 7. Review and harden local firewall and host-based security policies to restrict access to the ActivityWatch REST API to trusted processes and users only.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Ireland
CVE-2022-31149: CWE-290: Authentication Bypass by Spoofing in ActivityWatch activitywatch
Description
ActivityWatch open-source automated time tracker. Versions prior to 0.12.0b2 are vulnerable to DNS rebinding attacks. This vulnerability impacts everyone running ActivityWatch and gives the attacker full access to the ActivityWatch REST API. Users should upgrade to v0.12.0b2 or later to receive a patch. As a workaround, block DNS lookups that resolve to 127.0.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2022-31149 is a medium-severity vulnerability affecting ActivityWatch, an open-source automated time tracking application. Versions prior to 0.12.0b2 are vulnerable to DNS rebinding attacks, which allow an attacker to bypass authentication mechanisms by spoofing the origin of requests. Specifically, this vulnerability enables an attacker to gain unauthorized full access to the ActivityWatch REST API. DNS rebinding attacks exploit the way browsers enforce same-origin policies by manipulating DNS responses to resolve a domain name to a local IP address (127.0.0.1), thereby tricking the browser into sending requests to local services that are normally inaccessible from the web. Since ActivityWatch exposes a REST API locally, an attacker can leverage this flaw to interact with the API as if they were a trusted local user, bypassing authentication controls (CWE-290). The vulnerability affects all users running vulnerable versions of ActivityWatch prior to 0.12.0b2. The recommended remediation is to upgrade to version 0.12.0b2 or later, which includes a patch to mitigate the DNS rebinding attack vector. As a temporary workaround, blocking DNS lookups that resolve to 127.0.0.1 can reduce exposure by preventing the attacker's domain from resolving to the local loopback address. There are no known exploits in the wild at this time, but the vulnerability presents a significant risk due to the potential for unauthorized access to user activity data and control over the time tracking application.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which ActivityWatch is deployed within their environments. ActivityWatch is primarily used for personal productivity tracking and may be adopted by individuals or teams within organizations. If exploited, an attacker could gain unauthorized access to sensitive user activity data, potentially exposing confidential information about employee behavior, project timelines, or productivity metrics. Furthermore, unauthorized control over the REST API could allow manipulation or deletion of tracking data, impacting data integrity and availability. In environments where ActivityWatch is integrated with other internal tools or workflows, this could lead to broader operational disruptions. Although the vulnerability requires local network access or a user to visit a malicious website, the ease of exploitation via DNS rebinding makes it a credible threat, especially in organizations with less restrictive network policies or where users frequently access untrusted web content. The confidentiality and integrity of user data are the primary concerns, with availability also potentially affected if the API is manipulated maliciously. Given the medium severity and the nature of the vulnerability, organizations should treat this as a moderate risk that warrants prompt remediation to prevent potential data leakage or operational interference.
Mitigation Recommendations
1. Upgrade all instances of ActivityWatch to version 0.12.0b2 or later immediately to apply the official patch that mitigates the DNS rebinding vulnerability. 2. Implement network-level controls to block DNS responses that resolve to 127.0.0.1 or other local IP addresses from untrusted domains, effectively preventing DNS rebinding attempts. 3. Configure browser security settings or use browser extensions that can detect and block DNS rebinding attacks, especially for users who run ActivityWatch locally. 4. Educate users about the risks of visiting untrusted websites while running ActivityWatch, as user interaction is required to trigger the attack via malicious web content. 5. Monitor network traffic for suspicious DNS queries or unusual API access patterns to detect potential exploitation attempts. 6. If feasible, isolate ActivityWatch instances within segmented network zones to limit exposure to external web traffic. 7. Review and harden local firewall and host-based security policies to restrict access to the ActivityWatch REST API to trusted processes and users only.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf688f
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 11:44:02 PM
Last updated: 7/26/2025, 12:09:02 PM
Views: 8
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.