Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4958: Authorization Bypass in OpenBMB XAgent

0
Low
VulnerabilityCVE-2026-4958cvecve-2026-4958
Published: Fri Mar 27 2026 (03/27/2026, 15:31:27 UTC)
Source: CVE Database V5
Vendor/Project: OpenBMB
Product: XAgent

Description

A vulnerability has been found in OpenBMB XAgent 1.0.0. This affects the function ReplayServer.on_connect/ReplayServer.send_data of the file XAgentServer/application/websockets/replayer.py of the component WebSocket Endpoint. Such manipulation of the argument interaction_id leads to authorization bypass. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 16:15:03 UTC

Technical Analysis

CVE-2026-4958 identifies an authorization bypass vulnerability in OpenBMB XAgent version 1.0.0, specifically within the WebSocket endpoint implementation in the ReplayServer component. The vulnerability is caused by improper validation or manipulation of the interaction_id parameter in the ReplayServer.on_connect and ReplayServer.send_data functions located in the XAgentServer/application/websockets/replayer.py file. This flaw allows an attacker to bypass authorization checks remotely, potentially gaining unauthorized access to functionality or data that should be restricted. The attack vector is network-based (AV:N), with high attack complexity (AC:H), requiring low privileges (PR:L), and no user interaction (UI:N). The vulnerability does not impact confidentiality, integrity, or availability significantly (VC:L, VI:N, VA:N), and it does not require scope changes or authentication bypass beyond the authorization bypass. Despite public disclosure, no known exploits have been observed in the wild, and the vendor has not issued a patch or responded to the report. The vulnerability's exploitability is difficult due to the complexity of crafting valid interaction_id manipulations and the need to understand the WebSocket protocol interactions within the XAgent. The lack of vendor response and patch availability increases the risk for organizations relying on this software. The CVSS 4.0 score of 2.3 reflects the low severity but does not diminish the importance of addressing the issue in sensitive environments.

Potential Impact

The primary impact of CVE-2026-4958 is unauthorized access to functions or data within the OpenBMB XAgent WebSocket endpoint, potentially allowing attackers to perform actions without proper authorization. Although the vulnerability does not directly compromise confidentiality, integrity, or availability at a high level, unauthorized access could lead to information disclosure or unauthorized command execution depending on the application context. The difficulty of exploitation and the requirement for low privileges limit the threat scope, but in environments where XAgent is used for critical monitoring or control functions, even limited unauthorized access could have operational consequences. The absence of vendor patches and public exploit code means the risk is currently theoretical but could increase if attackers develop reliable exploits. Organizations with exposed XAgent WebSocket endpoints may face targeted attacks aiming to bypass authorization controls, especially in sectors where OpenBMB products are prevalent. The overall impact is low but non-negligible for sensitive deployments.

Mitigation Recommendations

Given the lack of an official patch or vendor response, organizations should implement compensating controls to mitigate CVE-2026-4958. These include restricting network access to the XAgent WebSocket endpoint using firewalls or network segmentation to limit exposure to trusted users and systems only. Employing strong authentication and authorization mechanisms at the network perimeter can reduce unauthorized connection attempts. Monitoring WebSocket traffic for anomalous interaction_id values or unusual connection patterns may help detect exploitation attempts. If feasible, disabling or limiting the use of the ReplayServer component or WebSocket functionality until a patch is available can reduce risk. Organizations should also engage with OpenBMB or community forums for updates and consider applying custom patches or workarounds if available. Regularly auditing and updating software versions and configurations, combined with incident response preparedness, will help manage potential exploitation risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-27T08:07:54.929Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6a9723c064ed76fbf9385

Added to database: 3/27/2026, 3:59:46 PM

Last enriched: 3/27/2026, 4:15:03 PM

Last updated: 3/27/2026, 11:41:23 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses