CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-21883
7.4

Unzipping the Origin: How a Python Iterator Flaw Broke Bokeh

Alon Barad
Alon Barad
Software Engineer

Jan 7, 2026·5 min read·9 visits

PoC Available

Executive Summary (TL;DR)

Bokeh versions < 3.8.2 used Python's `zip()` function to validate WebSocket origins. Because `zip()` stops at the shortest list, an attacker controlling `target.com.evil.com` could bypass the allowlist for `target.com`. This allows attackers to hijack interactive visualization sessions.

A logic error in the Bokeh visualization library allows attackers to bypass WebSocket origin validation. By exploiting the behavior of Python's `zip()` function, malicious sites can masquerade as trusted origins, leading to Cross-Site WebSocket Hijacking (CSWSH).

Official Patches

BokehCommit fixing the Origin validation logic

Fix Analysis (1)

Technical Appendix

CVSS Score
7.4/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Affected Systems

Bokeh Server

Affected Versions Detail

Product
Affected Versions
Fixed Version
Bokeh
Bokeh
< 3.8.23.8.2
AttributeDetail
CWECWE-1385 (Missing Origin Validation in WebSockets)
Attack VectorNetwork (AV:N)
CVSS7.4 (High)
ImpactSession Hijacking / Data Exfiltration
Root CauseLogic Error (Iterating over partial match)
Patch StatusAvailable (v3.8.2)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1557Adversary-in-the-Middle
Credential Access
CWE-1385
Missing Origin Validation in WebSockets

Known Exploits & Detection

HypotheticalExploitation requires hosting a page on a domain that starts with the target domain name as a prefix.

Vulnerability Timeline

Patch committed to Bokeh repository
2026-01-05
GHSA-793v-589g-574v published
2026-01-06
CVE-2026-21883 assigned
2026-01-06

References & Sources

  • [1]GHSA Advisory
  • [2]Bokeh Project

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.