Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

May 8, 2026

How Crowdsourced Security is Transforming the Public Sector Cybersecur

May 8, 2026

PCPJack Campaign Boots TeamPCP Off Compromised Machines

May 8, 2026
Facebook X (Twitter) Instagram
Friday, May 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Cline Kanban Flaw Lets Websites Hijack AI Coding Agents
News

Cline Kanban Flaw Lets Websites Hijack AI Coding Agents

Team-CWDBy Team-CWDMay 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A critical vulnerability in the Cline Kanban server has been disclosed that allows any website a developer visits to silently exfiltrate workspace data, inject commands into the AI agent’s terminal or kill active agent sessions.

The flaw, given a CVSS score of 9.7, was identified in a security assessment by researchers at Oasis Security, who published a technical analysis of the issue on May 7. It affects version 0.1.59 of the Kanban npm package and stems from missing origin validation and authentication on three WebSocket endpoints exposed by the local server.

Cline is one of the most widely adopted open-source AI coding assistants, and its Kanban feature provides a web-based project management interface backed by a local HTTP and WebSocket server on port 3484.

Three Unauthenticated Endpoints, One Attack Chain

The Kanban server exposes three WebSocket endpoints that handle runtime state, terminal I/O and session control.

On connection, the runtime endpoint sends a full snapshot of the developer’s environment, including filesystem paths, task data, git history and AI agent chat messages. The terminal endpoint provides raw bidirectional access to the agent’s pseudo-terminal, with messages written directly to the input buffer.

Oasis Security said none of the endpoints validated the Origin header on the upgrade request or required any session token. The implicit assumption was that binding to 127.0.0.1 confined access to the local machine, but browsers do not enforce cross-origin restrictions on WebSocket connections to localhost in the way they do for standard HTTP requests.

Read more on AI agent WebSocket flaws: ClawJacked Bug Enables Covert AI Agent Hijacking

Bypass Permissions Compounds the Risk

The exploit chain progresses from passive reconnaissance to remote code execution entirely from JavaScript on any webpage the developer visits while Cline is running. A malicious page can connect to the runtime endpoint, harvest workspace context, identify an active task ID, then push commands to the terminal endpoint that the agent processes as if typed by the user.

The risk is amplified by Cline’s default “bypass permissions” flag, which lets the AI agent execute shell commands and modify the filesystem without per-action authorization. Oasis recommended disabling it in the application settings.

Trey Ford, chief strategy and trust officer at Bugcrowd, said the broader issue extended well beyond the specific package.

“This vulnerability required no phishing, no malware, and no social engineering,” he said. “Patching Cline to v0.1.66 closes this specific exposure. Auditing every AI tool that opens a local listener is the actual job to be done.”

Oasis Security reported the findings to Cline before the publication of the research. Updating Cline to version 0.1.66 closes this specific exposure.

The issue follows the same pattern that Oasis previously documented in its OpenClaw research, suggesting the localhost-as-trust-boundary error is systemic across AI coding agent platforms.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
Next Article Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately
Team-CWD
  • Website

Related Posts

News

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

May 8, 2026
News

PCPJack Campaign Boots TeamPCP Off Compromised Machines

May 8, 2026
News

How to Automate Exposure Validation to Match the Speed of AI Attacks

May 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

What parents should know to protect their children from doxxing

November 28, 2025

How to tell if a voice call is AI or not

February 23, 2026

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.