Skip to content

Commit 468f626

Browse files
1 parent 1e9c5c6 commit 468f626

File tree

2 files changed

+202
-0
lines changed

2 files changed

+202
-0
lines changed
Lines changed: 133 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,133 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mjf5-7g4m-gx5w",
4+
"modified": "2026-02-26T15:16:10Z",
5+
"published": "2026-02-26T15:16:10Z",
6+
"aliases": [
7+
"CVE-2026-27148"
8+
],
9+
"summary": "Storybook Dev Server is Vulnerable to WebSocket Hijacking",
10+
"details": "### Summary\n\nThe WebSocket functionality in Storybook's dev server, used to create and update stories, is vulnerable to WebSocket hijacking. This vulnerability **only affects the Storybook dev server; production builds are not impacted**.\n\n### Details\n\nExploitation requires a developer to visit a malicious website while their local Storybook dev server is running. Because the WebSocket connection does not validate the origin of incoming connections, a malicious site can silently send WebSocket messages to the local instance without any further user interaction.\n\nIf a Storybook dev server is intentionally exposed publicly (e.g. for design reviews or stakeholder demos) the risk is higher, as no malicious site visit is required. Any unauthenticated attacker can send WebSocket messages to it directly.\n\nThe vulnerability affects the WebSocket message handlers for creating and saving stories, which can be exploited via unauthorized WebSocket connections to achieve persistent XSS or Remote Code Execution (RCE).\n\n_Note: recent versions of Chrome have some protections against this, but Firefox does not._\n\n### Impact\nThis vulnerability can lead to supply chain compromise. Key risks include:\n\n- **Remote Code Execution**: The vulnerability can allow attackers to execute malicious code, with the extent of impact depending on the configuration. Server-side RCE is possible in non-default configurations, such as when stories are executed via portable stories in JSDOM, potentially allowing attackers to exfiltrate credentials and environment variables, access source code and the filesystem, establish backdoors, or pivot to internal network resources.\n- **Persistent XSS**: Malicious payloads are written directly into story source files. If the malicious payload is committed to version control, it becomes part of the codebase and can propagate to deployed Storybook documentation sites, affecting developers and stakeholders who view them.\n- **Supply Chain Propagation**: If the modified source files are committed, injected code can spread to other team members via git, execute in CI/CD pipelines, and affect shared component libraries used across multiple projects.\n\n### Affected versions\n\n8.1 and above. While the exploitable functionality was introduced in 8.1, the patch has been applied to 7.x as a precautionary measure given the underlying WebSocket behaviour.\n\n### Recommended actions\nUpdate to one of the patched versions: `7.6.23`, `8.6.17`, `9.1.19`, `10.2.10`.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "storybook"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "8.1.0"
29+
},
30+
{
31+
"fixed": "8.6.17"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "npm",
40+
"name": "storybook"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "8.7.0-alpha.0"
48+
},
49+
{
50+
"fixed": "9.1.19"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "npm",
59+
"name": "storybook"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "10.0.0-beta.0"
67+
},
68+
{
69+
"fixed": "10.2.10"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "WEB",
79+
"url": "https://github.com/storybookjs/storybook/security/advisories/GHSA-mjf5-7g4m-gx5w"
80+
},
81+
{
82+
"type": "ADVISORY",
83+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27148"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://github.com/storybookjs/storybook/commit/0affdf928bd6fafbadfb1dfe22ce6104805e10e8"
88+
},
89+
{
90+
"type": "WEB",
91+
"url": "https://github.com/storybookjs/storybook/commit/54689a8add18ea75d628c540f4bc677592a1e685"
92+
},
93+
{
94+
"type": "WEB",
95+
"url": "https://github.com/storybookjs/storybook/commit/b8cfa77c73940c140acdcd8a06ab1ea913c44761"
96+
},
97+
{
98+
"type": "WEB",
99+
"url": "https://github.com/storybookjs/storybook/commit/d34085f39c647f5c23c3a3b2d197c18602fcf876"
100+
},
101+
{
102+
"type": "PACKAGE",
103+
"url": "https://github.com/storybookjs/storybook"
104+
},
105+
{
106+
"type": "WEB",
107+
"url": "https://github.com/storybookjs/storybook/releases/tag/v10.2.10"
108+
},
109+
{
110+
"type": "WEB",
111+
"url": "https://github.com/storybookjs/storybook/releases/tag/v7.6.23"
112+
},
113+
{
114+
"type": "WEB",
115+
"url": "https://github.com/storybookjs/storybook/releases/tag/v8.6.17"
116+
},
117+
{
118+
"type": "WEB",
119+
"url": "https://github.com/storybookjs/storybook/releases/tag/v9.1.19"
120+
}
121+
],
122+
"database_specific": {
123+
"cwe_ids": [
124+
"CWE-1385",
125+
"CWE-74",
126+
"CWE-79"
127+
],
128+
"severity": "HIGH",
129+
"github_reviewed": true,
130+
"github_reviewed_at": "2026-02-26T15:16:10Z",
131+
"nvd_published_at": "2026-02-25T22:16:25Z"
132+
}
133+
}
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vjqx-cfc4-9h6v",
4+
"modified": "2026-02-26T15:16:57Z",
5+
"published": "2026-02-26T15:16:57Z",
6+
"aliases": [
7+
"CVE-2026-27735"
8+
],
9+
"summary": "mcp-server-git : Path traversal in git_add allows staging files outside repository boundaries",
10+
"details": "In `mcp-server-git` versions prior to 2026.1.14, the `git_add` tool did not validate that file paths provided in the files argument were within the repository boundaries. The tool used GitPython's `repo.index.add(`, which did not enforce working-tree boundary checks for relative paths. As a result, relative paths containing `../` sequences that resolved outside the repository were accepted and staged into the Git index, potentially allowing sensitive files to be exfiltrated via subsequent commit and push operations. The fix in PR #3164 switches to `repo.git.add()`, which delegates to the Git CLI and properly rejects out-of-tree paths. Users are advised to upgrade to 2026.1.14 or newer to remediate this issue.\n\nmcp-server-git thanks https://hackerone.com/0dd-g for reporting and contributing the fix.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "mcp-server-git"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2026.1.14"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/modelcontextprotocol/servers/security/advisories/GHSA-vjqx-cfc4-9h6v"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27735"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/modelcontextprotocol/servers/pull/3164"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/modelcontextprotocol/servers/commit/862e717ff714987bd5577318df09858e14883863"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/modelcontextprotocol/servers"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-22"
63+
],
64+
"severity": "MODERATE",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-02-26T15:16:57Z",
67+
"nvd_published_at": "2026-02-26T00:16:25Z"
68+
}
69+
}

0 commit comments

Comments
 (0)