Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28403: CWE-346: Origin Validation Error in textream

0
High
VulnerabilityCVE-2026-28403cvecve-2026-28403cwe-346
Published: Mon Mar 02 2026 (03/02/2026, 15:45:18 UTC)
Source: CVE Database V5
Product: textream

Description

Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A malicious web page visited in the same browser session can silently connect to the local WebSocket server and send arbitrary `DirectorCommand` payloads, allowing full remote control of the teleprompter content. Version 1.5.1 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 17:20:22 UTC

Technical Analysis

CVE-2026-28403 is an origin validation error categorized under CWE-346 affecting the Textream teleprompter application for macOS. The vulnerability exists in the DirectorServer WebSocket server component, which listens on a local loopback address (ws://127.0.0.1:<httpPort+1>). Prior to version 1.5.1, this WebSocket server fails to validate the HTTP Origin header during the WebSocket handshake process. The Origin header is a critical security control that ensures only trusted web pages can establish WebSocket connections. Without this validation, any malicious web page opened in the same browser session can silently connect to the local WebSocket server. Once connected, the attacker can send arbitrary DirectorCommand payloads, which control the teleprompter content remotely. This could allow manipulation or disruption of the teleprompter's displayed text, potentially causing misinformation or operational disruption during presentations or broadcasts. The vulnerability does not require any authentication or elevated privileges, but exploitation requires the user to visit a malicious web page, making user interaction necessary. The CVSS v3.1 base score is 7.6 (high), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and significant impact on integrity and some impact on confidentiality and availability. The issue was publicly disclosed and fixed in Textream version 1.5.1, which implements proper Origin header validation to restrict WebSocket connections to trusted sources only.

Potential Impact

The vulnerability allows attackers to remotely control the teleprompter content on affected macOS systems running Textream versions prior to 1.5.1. This can lead to misinformation during live presentations or broadcasts, undermining the integrity of the content displayed. Confidentiality is moderately impacted as an attacker could potentially infer or manipulate displayed text. Availability impact is low but present, as the teleprompter could be disrupted or rendered unusable. Organizations relying on Textream for professional or public-facing presentations risk reputational damage, misinformation dissemination, and operational disruption. Since exploitation requires user interaction (visiting a malicious web page), targeted phishing or watering hole attacks could be used to compromise specific high-value targets. The vulnerability is particularly concerning in environments where teleprompter content integrity is critical, such as media companies, government communications, and corporate presentations.

Mitigation Recommendations

Immediate upgrade of Textream to version 1.5.1 or later is the primary mitigation, as this version includes proper Origin header validation. Until upgrade, organizations should restrict access to untrusted web content on systems running vulnerable versions to reduce the risk of malicious web pages establishing WebSocket connections. Employ browser security controls such as disabling or limiting WebSocket connections from untrusted origins, using browser extensions or policies that block suspicious scripts, and educating users about the risks of visiting untrusted websites. Network-level controls can also be implemented to restrict loopback WebSocket connections if feasible. Monitoring local WebSocket server activity for unusual connections or commands may help detect exploitation attempts. Finally, organizations should consider alternative teleprompter solutions if immediate patching is not possible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:33:57.289Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5b6a132ffcdb8a25206a6

Added to database: 3/2/2026, 4:11:13 PM

Last enriched: 3/9/2026, 5:20:22 PM

Last updated: 4/15/2026, 11:35:29 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses