Cline Kanban Server Cross-Origin WebSocket Hijacking Vulnerability
The `kanban` npm package, used by the `cline` CLI, has a cross-origin WebSocket hijacking vulnerability. Due to the lack of Origin header validation, any website can connect to the kanban server via WebSocket and leak sensitive data, hijack running AI agent terminals leading to remote code execution, or kill running agent tasks, resulting in information disclosure, RCE, and denial of service.
The kanban npm package (used by the cline CLI) starts a WebSocket server on 127.0.0.1:3484 with no Origin header validation, allowing any website a developer visits to silently connect to the kanban server via WebSocket. This vulnerability, present in kanban version 0.1.59 and cline up to version 2.13.0, enables attackers to leak sensitive data in real-time, including workspace filesystem paths, task titles/descriptions, and git branch info. Furthermore, attackers can hijack running AI agent terminals by injecting arbitrary prompts, leading to remote code execution, and kill running agent tasks by terminating active sessions via the control WebSocket. This vulnerability poses a significant risk to developers using the cline CLI, as it allows for complete compromise of their local development environment.
Attack Chain
- Attacker hosts a malicious website.
- Victim visits the attacker-controlled website while running a vulnerable version of Cline with Kanban.
- The malicious website establishes a WebSocket connection to
ws://127.0.0.1:3484/api/runtime/wson the victim’s machine. - The server sends a snapshot of the developer’s workspace, leaking sensitive information, including file paths, task details, and Git information.
- The attacker monitors the runtime WebSocket for
task_sessions_updatedmessages to detect running AI agent sessions. - Upon detecting a running session, the attacker connects to
ws://127.0.0.1:3484/api/terminal/ioand injects a malicious prompt followed by a carriage return. - The injected prompt is executed by the AI agent, leading to remote code execution.
- Alternatively, the attacker could connect to
ws://127.0.0.1:3484/api/terminal/controland send a “stop” message to terminate the task.
Impact
The vulnerability allows for information disclosure by leaking sensitive development environment data, including workspace paths, task content, and Git branches, streamed in real-time from any website. It also enables remote code execution through terminal hijacking, where commands are injected into the AI agent when a task is active. Finally, it permits denial of service by killing any running agent task via the control WebSocket. Attack requirements: The victim must have Cline Kanban running and visit an attacker-controlled webpage.
Recommendation
- Deploy the following Sigma rule to detect connections to the exposed WebSocket endpoints (ws_connection_kanban_api).
- Block access to the malicious PoC URL
http://cline.sagilayani.com:1337/?key=clinevuln2026at the network perimeter based on the IOC list. - Apply the recommended fixes by the vendor, including validating the Origin header on WebSocket upgrade requests and requiring a session token.
- Patch CVE-2026-44211 by updating
clineto a version greater than 2.13.0. - Monitor network connections to
127.0.0.1:3484to identify potential exploitation attempts using network_connection logs based on the IOC list.
Detection coverage 3
Detect WebSocket Connection to Kanban API Endpoints
highDetects WebSocket connections to the Kanban API endpoints, which may indicate exploitation of CVE-2026-44211.
Detect Cline Kanban PoC Site Visit
mediumDetects access to the Cline Kanban exploit proof-of-concept website.
Detect Malicious Command Injection via Terminal IO WebSocket
highDetects suspicious commands being sent via the Terminal IO WebSocket, potentially indicating an RCE attempt.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
1
url
| Type | Value |
|---|---|
| url | http://cline.sagilayani.com:1337/?key=clinevuln2026 |