CVE-2025-61987
WebSocket Origin Validation Bypass in GroupSession Exposes Chat Data
Publication date: 2025-12-12
Last updated on: 2026-02-17
Assigner: JPCERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| groupsession | groupsession | to 5.3.3 (exc) |
| groupsession | groupsession | to 5.3.0 (exc) |
| groupsession | groupsession | to 5.3.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1385 | The product uses a WebSocket, but it does not properly verify that the source of data or communication is valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in GroupSession Free edition prior to version 5.3.0, GroupSession byCloud prior to version 5.3.3, and GroupSession ZION prior to version 5.3.2. The issue is that these versions do not validate origins in WebSockets. As a result, if a user accesses a crafted page, chat information sent to the user may be exposed to unauthorized parties.
How can this vulnerability impact me? :
The vulnerability can lead to exposure of chat information to unauthorized users if they access a specially crafted page. This could result in leakage of potentially sensitive or private chat data.
What immediate steps should I take to mitigate this vulnerability?
Users are advised to update GroupSession to the latest versions provided by the vendor to mitigate this vulnerability. [2]