CVE-2025-54816

CRITICAL
2026-01-22 [email protected]
9.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
CVE Published
Jan 22, 2026 - 23:15 nvd
CRITICAL 9.4

Description

This vulnerability occurs when a WebSocket endpoint does not enforce proper authentication mechanisms, allowing unauthorized users to establish connections. As a result, attackers can exploit this weakness to gain unauthorized access to sensitive data or perform unauthorized actions. Given that no authentication is required, this can lead to privilege escalation and potentially compromise the security of the entire system.

Analysis

A WebSocket endpoint lacks proper authentication, allowing unauthenticated users to connect and interact with real-time data streams and server-side functionality.

Technical Context

The WebSocket endpoint does not enforce authentication (CWE-306), allowing any client to establish a WebSocket connection and interact with the server's real-time functionality without credentials.

Affected Products

['Affected product (per NVD)']

Remediation

Implement WebSocket authentication (token-based or session-based). Validate credentials on connection establishment.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +47
POC: 0

Share

CVE-2025-54816 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy