Vulnerability Description
Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A malicious web page visited in the same browser session can silently connect to the local WebSocket server and send arbitrary `DirectorCommand` payloads, allowing full remote control of the teleprompter content. Version 1.5.1 fixes the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fka | Textream | < 1.5.1 |
Related Weaknesses (CWE)
References
- https://github.com/f/textream/commit/f5ebad82750b9313386c34af8f0ede50c213a8a0Patch
- https://github.com/f/textream/security/advisories/GHSA-wr3v-x247-337wExploitMitigationVendor Advisory
FAQ
What is CVE-2026-28403?
CVE-2026-28403 is a vulnerability with a CVSS score of 7.6 (HIGH). Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP...
How severe is CVE-2026-28403?
CVE-2026-28403 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28403?
Check the references section above for vendor advisories and patch information. Affected products include: Fka Textream.