๐Ÿ” CVE Alert

CVE-2026-28403

HIGH 7.6

Textream Cross-Site WebSocket Hijacking (CSWSH) vulnerability

CVSS Score
7.6
EPSS Score
0.0%
EPSS Percentile
0th

Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A malicious web page visited in the same browser session can silently connect to the local WebSocket server and send arbitrary `DirectorCommand` payloads, allowing full remote control of the teleprompter content. Version 1.5.1 fixes the issue.

CWE CWE-346
Vendor f
Product textream
Published Mar 2, 2026
Last Updated Mar 2, 2026
Stay Ahead of the Next One

Get instant alerts for f textream

Be the first to know when new high vulnerabilities affecting f textream are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
Low

Affected Versions

f / textream
< 1.5.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/f/textream/security/advisories/GHSA-wr3v-x247-337w github.com: https://github.com/f/textream/commit/f5ebad82750b9313386c34af8f0ede50c213a8a0