Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A malicious web page visited in the same browser session can silently connect to the local WebSocket server and send arbitrary `DirectorCommand` payloads, allowing full remote control of the teleprompter content. Version 1.5.1 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Textream
Textream textream |
|
| CPEs | cpe:2.3:a:textream:textream:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Textream
Textream textream |
Wed, 04 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F
F textream |
|
| Vendors & Products |
F
F textream |
Mon, 02 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A malicious web page visited in the same browser session can silently connect to the local WebSocket server and send arbitrary `DirectorCommand` payloads, allowing full remote control of the teleprompter content. Version 1.5.1 fixes the issue. | |
| Title | Textream Cross-Site WebSocket Hijacking (CSWSH) vulnerability | |
| Weaknesses | CWE-346 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-02T19:27:12.422Z
Reserved: 2026-02-27T15:33:57.289Z
Link: CVE-2026-28403
Updated: 2026-03-02T19:27:02.104Z
Status : Analyzed
Published: 2026-03-02T16:16:25.750
Modified: 2026-03-04T14:49:56.163
Link: CVE-2026-28403
No data.