Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform
May 12, 2026
Critical Cline AI Agent Vulnerability Allows RCE Attacks
May 12, 2026
Malicious Chrome MV3 Extension Steals TronLink Crypto
May 12, 2026
Home/Vulnerabilities/Critical Cline AI Agent Vulnerability Allows RCE Attacks
Vulnerabilities

Critical Cline AI Agent Vulnerability Allows RCE Attacks

A critical vulnerability within the Cline Kanban server allows threat actors to exfiltrate workspace data and remotely execute arbitrary code silently. Security researcher TheRealSpencer recently...

Jennifer sherman
Jennifer sherman
May 12, 2026 2 Min Read
2 0

A critical vulnerability within the Cline Kanban server allows threat actors to exfiltrate workspace data and remotely execute arbitrary code silently.

Security researcher TheRealSpencer recently published details of this cross-origin WebSocket hijacking vulnerability affecting the widely adopted open-source AI coding assistant.

The vulnerability is tracked as CVE-2026-44211 and carries a near-maximum severity score of 9.7.

Researchers at Oasis Security noted that the issue stems from missing origin validation on the local server exposed by the package.

Developers using the affected software are at high risk simply by visiting a malicious webpage. At the same time, the server runs in the background.

Cline AI Agent Vulnerability

The core issue resides in the kanban npm package used by the Cline command-line interface.

When launched, the application starts a local WebSocket server on port 3484 without implementing authentication or checking the origin header of incoming requests.

This architectural oversight means that any external website a developer visits can establish a connection to the local server without any user intervention.

Security analysts observed that web browsers do not restrict cross-origin WebSocket connections to localhost, allowing malicious JavaScript to interact freely with the exposed endpoints.

Once connected to the runtime stream, attackers can instantly leak sensitive information, including filesystem paths, git branch details, task titles, and live AI agent chat messages.

Beyond information disclosure, the vulnerability allows remote attackers to seize control of running AI agent terminals.

By connecting to the terminal input-output WebSocket, threat actors can inject arbitrary prompts directly into the agent’s active workspace.

The system processes these injected commands just like native user input, turning basic text injection into full remote code execution when followed by a carriage return.

Security experts have demonstrated that this can be used to execute malicious shell commands on the victim’s operating system without any direct user interaction.

Additionally, the control server endpoint can be manipulated to terminate active sessions, creating a denial-of-service condition.

The exploit is effective across any platform where Node.js and Cline are deployed, including macOS, Linux, and Windows environments.

There are currently no patched versions available for this critical vulnerability, leaving developers exposed when using older versions of the Cline CLI.

Mitigation requires significant structural changes to the application’s local web server implementation.

Following the publication by TheRealSpencer on GitHub, security professionals advised developers to validate origin headers to prevent unauthorized WebSocket upgrades.

Furthermore, generating and requiring a randomized session token at server startup would effectively block external origins from guessing the necessary connection parameters.

Until official patches are released, developers should exercise extreme caution when navigating the internet while running the Cline Kanban application.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Malicious Chrome MV3 Extension Steals TronLink Crypto

Next Post

North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical PHP SOAP Flaws Enable Remote Code Execution Attacks
May 12, 2026
Magecart Hackers Abuse GTM for Credit Card Sk Google Manager
May 12, 2026
TeamPCP Compromises Checkmarx Jenkins Compromised Plugin
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us