Cline Kanban WebSocket Hijack

You're a developer. Cline is running. You open a browser tab to read documentation. In the background, JavaScript on that page silently connects to Cline's localhost WebSocket server, reads your workspace, and injects a shell command into your AI agent's terminal, running with your full user privileges.

This is not a bug in one tool. It's a pattern.

Oasis Security researchers identified a critical vulnerability (CVSS 9.7) in Cline's kanban server. All three WebSocket endpoints lack Origin validation and authentication. Browsers don't enforce same-origin policy on WebSocket connections, so any website the developer visits can connect.

Chained together, three flaws produce a full compromise from any website the developer visits:

  1. Information disclosure through the runtime state stream
  2. Remote code execution through the terminal I/O endpoint
  3. Denial of service through the terminal control endpoint

What you can do today:

  • Disable the "Enable bypass permissions flag" in Cline Settings
  • Audit AI agent tools exposing localhost interfaces for Origin validation
  • Treat localhost as routable from the browser, not as a trust boundary

Cline Kanban WebSocket Hijack: Full technical Report
Share