Bokeh server applications have Incomplete Origin Validation in WebSockets
Bokeh is an interactive visualization library written in Python. In versions 3.8.1 and below, if a server is configured with an allowlist (e.g., dashboard.corp), an attacker can register a domain like dashboard.corp.attacker.com (or use a subdomain if applicable) and lure a victim to visit it. The malicious site can then initiate a WebSocket connection to the vulnerable Bokeh server. Since the Origin header (e.g., http://dashboard.corp.attacker.com/) matches the allowlist according to the flawed logic, the connection is accepted. Once connected, the attacker can interact with the Bokeh server on behalf of the victim, potentially accessing sensitive data, or modifying visualizations. This issue is fixed in version 3.8.2.
References
- https://github.com/bokeh/bokeh/security/advisories/GHSA-793v-589g-574v x_refsource_CONFIRM
- https://github.com/bokeh/bokeh/commit/cedd113b0e271b439dce768671685cf5f861812e x_refsource_MISC
- https://github.com/bokeh/bokeh/security/advisories/GHSA-793v-589g-574v x_refsource_CONFIRM
- https://github.com/bokeh/bokeh/commit/cedd113b0e271b439dce768671685cf5f861812e x_refsource_MISC
- https://aydinnyunus.github.io/2026/01/24/bokeh-websocket-hijacking-cve-2026-218…
Affected products
- ==< 3.8.2
Matching in nixpkgs
pkgs.python312Packages.bokeh
Statistical and novel interactive HTML plots for Python
pkgs.python313Packages.bokeh
Statistical and novel interactive HTML plots for Python
pkgs.python312Packages.bokeh-sampledata
Sample datasets for Bokeh examples
pkgs.python313Packages.bokeh-sampledata
Sample datasets for Bokeh examples
Package maintainers
-
@orivej Orivej Desh <orivej@gmx.fr>
-
@doronbehar Doron Behar <me@doronbehar.com>