Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A malicious web page visited in the same browser session can silently connect to the local WebSocket server and send arbitrary `DirectorCommand` payloads, allowing full remote control of the teleprompter content. Version 1.5.1 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/f/textream/commit/f5ebad82750b9313386c34af8f0ede50c213a8a0 | Patch |
| https://github.com/f/textream/security/advisories/GHSA-wr3v-x247-337w | Exploit Mitigation Vendor Advisory |
Configurations
History
10 Mar 2026, 18:28
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:fka:textream:*:*:*:*:*:*:*:* | |
| References | () https://github.com/f/textream/security/advisories/GHSA-wr3v-x247-337w - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Fka
Fka textream |
04 Mar 2026, 14:49
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/f/textream/commit/f5ebad82750b9313386c34af8f0ede50c213a8a0 - Patch | |
| References | () https://github.com/f/textream/security/advisories/GHSA-wr3v-x247-337w - Exploit, Vendor Advisory, Mitigation | |
| First Time |
Textream
Textream textream |
|
| CPE | cpe:2.3:a:textream:textream:*:*:*:*:*:*:*:* |
02 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-02 16:16
Updated : 2026-03-10 18:28
NVD link : CVE-2026-28403
Mitre link : CVE-2026-28403
CVE.ORG link : CVE-2026-28403
JSON object : View
Products Affected
fka
- textream
CWE
CWE-346
Origin Validation Error
