CVE-2026-28403: CWE-346: Origin Validation Error in textream
Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A malicious web page visited in the same browser session can silently connect to the local WebSocket server and send arbitrary `DirectorCommand` payloads, allowing full remote control of the teleprompter content. Version 1.5.1 fixes the issue.
AI Analysis
Technical Summary
CVE-2026-28403 is an origin validation error categorized under CWE-346 affecting the Textream teleprompter application for macOS. The vulnerability exists in the DirectorServer WebSocket server component, which listens on a local loopback address (ws://127.0.0.1:<httpPort+1>). Prior to version 1.5.1, this WebSocket server fails to validate the HTTP Origin header during the WebSocket handshake process. The Origin header is a critical security control that ensures only trusted web pages can establish WebSocket connections. Without this validation, any malicious web page opened in the same browser session can silently connect to the local WebSocket server. Once connected, the attacker can send arbitrary DirectorCommand payloads, which control the teleprompter content remotely. This could allow manipulation or disruption of the teleprompter's displayed text, potentially causing misinformation or operational disruption during presentations or broadcasts. The vulnerability does not require any authentication or elevated privileges, but exploitation requires the user to visit a malicious web page, making user interaction necessary. The CVSS v3.1 base score is 7.6 (high), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and significant impact on integrity and some impact on confidentiality and availability. The issue was publicly disclosed and fixed in Textream version 1.5.1, which implements proper Origin header validation to restrict WebSocket connections to trusted sources only.
Potential Impact
The vulnerability allows attackers to remotely control the teleprompter content on affected macOS systems running Textream versions prior to 1.5.1. This can lead to misinformation during live presentations or broadcasts, undermining the integrity of the content displayed. Confidentiality is moderately impacted as an attacker could potentially infer or manipulate displayed text. Availability impact is low but present, as the teleprompter could be disrupted or rendered unusable. Organizations relying on Textream for professional or public-facing presentations risk reputational damage, misinformation dissemination, and operational disruption. Since exploitation requires user interaction (visiting a malicious web page), targeted phishing or watering hole attacks could be used to compromise specific high-value targets. The vulnerability is particularly concerning in environments where teleprompter content integrity is critical, such as media companies, government communications, and corporate presentations.
Mitigation Recommendations
Immediate upgrade of Textream to version 1.5.1 or later is the primary mitigation, as this version includes proper Origin header validation. Until upgrade, organizations should restrict access to untrusted web content on systems running vulnerable versions to reduce the risk of malicious web pages establishing WebSocket connections. Employ browser security controls such as disabling or limiting WebSocket connections from untrusted origins, using browser extensions or policies that block suspicious scripts, and educating users about the risks of visiting untrusted websites. Network-level controls can also be implemented to restrict loopback WebSocket connections if feasible. Monitoring local WebSocket server activity for unusual connections or commands may help detect exploitation attempts. Finally, organizations should consider alternative teleprompter solutions if immediate patching is not possible.
Affected Countries
United States, Canada, United Kingdom, Germany, Australia, Japan, South Korea, France, Netherlands, Sweden
CVE-2026-28403: CWE-346: Origin Validation Error in textream
Description
Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A malicious web page visited in the same browser session can silently connect to the local WebSocket server and send arbitrary `DirectorCommand` payloads, allowing full remote control of the teleprompter content. Version 1.5.1 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-28403 is an origin validation error categorized under CWE-346 affecting the Textream teleprompter application for macOS. The vulnerability exists in the DirectorServer WebSocket server component, which listens on a local loopback address (ws://127.0.0.1:<httpPort+1>). Prior to version 1.5.1, this WebSocket server fails to validate the HTTP Origin header during the WebSocket handshake process. The Origin header is a critical security control that ensures only trusted web pages can establish WebSocket connections. Without this validation, any malicious web page opened in the same browser session can silently connect to the local WebSocket server. Once connected, the attacker can send arbitrary DirectorCommand payloads, which control the teleprompter content remotely. This could allow manipulation or disruption of the teleprompter's displayed text, potentially causing misinformation or operational disruption during presentations or broadcasts. The vulnerability does not require any authentication or elevated privileges, but exploitation requires the user to visit a malicious web page, making user interaction necessary. The CVSS v3.1 base score is 7.6 (high), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and significant impact on integrity and some impact on confidentiality and availability. The issue was publicly disclosed and fixed in Textream version 1.5.1, which implements proper Origin header validation to restrict WebSocket connections to trusted sources only.
Potential Impact
The vulnerability allows attackers to remotely control the teleprompter content on affected macOS systems running Textream versions prior to 1.5.1. This can lead to misinformation during live presentations or broadcasts, undermining the integrity of the content displayed. Confidentiality is moderately impacted as an attacker could potentially infer or manipulate displayed text. Availability impact is low but present, as the teleprompter could be disrupted or rendered unusable. Organizations relying on Textream for professional or public-facing presentations risk reputational damage, misinformation dissemination, and operational disruption. Since exploitation requires user interaction (visiting a malicious web page), targeted phishing or watering hole attacks could be used to compromise specific high-value targets. The vulnerability is particularly concerning in environments where teleprompter content integrity is critical, such as media companies, government communications, and corporate presentations.
Mitigation Recommendations
Immediate upgrade of Textream to version 1.5.1 or later is the primary mitigation, as this version includes proper Origin header validation. Until upgrade, organizations should restrict access to untrusted web content on systems running vulnerable versions to reduce the risk of malicious web pages establishing WebSocket connections. Employ browser security controls such as disabling or limiting WebSocket connections from untrusted origins, using browser extensions or policies that block suspicious scripts, and educating users about the risks of visiting untrusted websites. Network-level controls can also be implemented to restrict loopback WebSocket connections if feasible. Monitoring local WebSocket server activity for unusual connections or commands may help detect exploitation attempts. Finally, organizations should consider alternative teleprompter solutions if immediate patching is not possible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-27T15:33:57.289Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a5b6a132ffcdb8a25206a6
Added to database: 3/2/2026, 4:11:13 PM
Last enriched: 3/9/2026, 5:20:22 PM
Last updated: 4/15/2026, 11:35:29 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.