What's Happening?
A critical security flaw has been identified in the Cline Kanban server, a widely used open-source AI coding assistant. This vulnerability allows any website visited by a developer to exfiltrate workspace data, inject commands into the AI agent's terminal,
or terminate active sessions. The flaw, which has been assigned a CVSS score of 9.7, was discovered by Oasis Security researchers. It affects version 0.1.59 of the Kanban npm package and is due to missing origin validation and authentication on three WebSocket endpoints exposed by the local server. These endpoints handle runtime state, terminal I/O, and session control, and do not validate the Origin header or require session tokens, making them susceptible to exploitation. The issue is compounded by Cline's default 'bypass permissions' flag, which allows the AI agent to execute shell commands without authorization. Oasis Security has recommended disabling this flag and updating to version 0.1.66 to mitigate the risk.
Why It's Important?
The discovery of this vulnerability highlights significant security risks associated with AI coding assistants, particularly those that open local listeners. The ability for malicious websites to hijack AI agents without phishing or malware underscores the need for robust security measures in software development environments. This flaw could have widespread implications for developers who rely on AI tools for coding, as it exposes sensitive data and allows unauthorized command execution. The incident emphasizes the importance of thorough security audits for AI tools and the need for developers to stay vigilant about software updates and security patches.
What's Next?
Developers using the Cline Kanban server are advised to update to version 0.1.66 to close the specific exposure. The broader issue of localhost-as-trust-boundary errors suggests a systemic problem across AI coding platforms, indicating that further research and security enhancements are necessary. Stakeholders in the software development industry may push for more stringent security protocols and regular audits to prevent similar vulnerabilities in the future.












