Summary
Versions 2026.2.10–2026.2.12 introduced the WebSocket origin check from CVE-2026-25253 but did not protect against HTTP/1.0 downgrade. An attacker who could control DNS or perform an HTTP-level downgrade could bypass the origin check. Patched in 2026.2.13.
Details
| CVE ID | CVE-2026-25712 |
| Severity | high (7.2) |
| CVSS vector | AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N |
| Published | 2026-02-21 |
| Patched | 2026-02-23 |
| Affected versions | 2026.2.10 – 2026.2.12 |
| Fixed in | 2026.2.13 |
| Exploited in the wild | no known exploitation |
Affected projects
What to do
- If you run an affected version: upgrade to
2026.2.13immediately. Do not delay this for convenience reasons. - Rotate any credentials that may have been exposed via the affected component.
- Audit your logs for indicators of exploitation — unexpected outbound traffic, anomalous tool calls, unfamiliar authenticated sessions.
- If exploitation is confirmed, treat the host as compromised: rebuild from a clean image, rotate every secret on the host, audit lateral movement.
Sources
- NIST NVD: CVE-2026-25712 on NVD
See also: all CVEs, tracked agents, methodology.