Nezha Monitoring: Nezha WebSocket server stream discloses cross-tenant server telemetry to authenticated members
Description
Summary
Any authenticated non-admin member can connect to the server-status WebSocket and receive telemetry for all servers, including servers owned by other users. The normal server list API filters objects by HasPermission, but the WebSocket stream treats the presence of any authenticated user as authorization for the full unfiltered server list.
Details
The server WebSocket route is registered under the optional-auth group in cmd/dashboard/controller/controller.go:71-73:
optionalAuth := api.Group("", optionalAuthMw)
optionalAuth.GET("/ws/server", commonHandler(serverStream))
serverStream treats any CtxKeyAuthorizedUser as a member, without checking admin role or per-server ownership, in cmd/dashboard/controller/ws.go:123-139:
u, isMember := c.Get(model.CtxKeyAuthorizedUser)
var userId uint64
if isMember {
userId = u.(*model.User).ID
}
...
stat, err := getServerStat(count == 0, isMember)
The authorization boolean is then used as a full/guest switch in getServerStat in cmd/dashboard/controller/ws.go:160-184:
if authorized {
serverList = singleton.ServerShared.GetSortedList()
} else {
serverList = singleton.ServerShared.GetSortedListForGuest()
}
...
servers = append(servers, model.StreamServer{
ID: server.ID,
Name: server.Name,
PublicNote: utils.IfOr(withPublicNote, server.PublicNote, ""),
DisplayIndex: server.DisplayIndex,
Host: utils.IfOr(authorized, server.Host, server.Host.Filter()),
State: server.State,
CountryCode: countryCode,
LastActive: server.LastActive,
})
For authenticated members, GetSortedList() returns all servers and server.Host is not filtered. There is no call to server.HasPermission(c).
The streamed response model in model/server_api.go:5-20 includes server ID/name, public note, host details, runtime state, country code, last active time, and global online count. Host and state fields include platform version, agent version, CPU/GPU names, memory/disk/swap totals, architecture, virtualization, boot time, CPU load, memory/disk/swap usage, network transfer/speed, uptime, TCP/UDP/process counts, temperatures, and GPU utilization, as defined in model/host.go:20-38 and model/host.go:100-112.
The normal list endpoint has the expected object-level authorization. GET /api/v1/server is registered with listHandler in cmd/dashboard/controller/controller.go:113, and listHandler filters each returned object with HasPermission in cmd/dashboard/controller/controller.go:263-291:
filtered := filter(c, data)
...
return slices.DeleteFunc(s, func(e E) bool {
return !e.HasPermission(ctx)
})
The shared permission model in model/common.go:44-56 allows admins to see all objects but restricts members to objects whose UserID matches their user ID:
if user.Role == RoleAdmin {
return true
}
return user.ID == c.UserID
Mitigations checked:
- Guests receive
GetSortedListForGuest()andHost.Filter()output, but authenticated members bypass both guest restrictions. HideForGuestonly affects unauthenticated guests, not members.- The normal
/api/v1/serverlist endpoint useslistHandlerand is not affected in the same way. - No owner/admin filter is applied in the WebSocket path.
Candidate score: 12/14
- Reachability: 2, default WebSocket API
- Attacker control: 1, attacker controls authentication state and connection
- Privilege required: 1, authenticated member
- Sink impact: 2, cross-tenant sensitive telemetry disclosure
- Mitigation weakness: 2, no object-level auth in the WebSocket path
- Default exposure: 2, endpoint is part of default dashboard
- Safe PoC feasibility: 2, can be verified with local users/servers or statically
Exploitability gate: statically confirmed
- Reachable source:
GET /api/v1/ws/server - Default/common configuration: dashboard API exposed by default
- Missing/bypassed mitigation: member-vs-guest check replaces object-level authorization
- Impact-bearing sink: WebSocket response includes unfiltered all-server telemetry
- Safe proof: static source-to-sink proof; full runtime test blocked locally by unavailable Go 1.26 toolchain
- Affected version evidence: confirmed at commit
85b0dd2992733037b019442caffc6c049ba937dd(v2.0.7-1-g85b0dd2) - Variant review: normal server list endpoint and guest filtering were checked
PoC
Static local PoC steps:
- Start Nezha with two non-admin users and at least one server assigned to each user.
- Authenticate as user A.
- Connect to the WebSocket endpoint with user A's token, for example:
GET /api/v1/ws/server HTTP/1.1
Host: 127.0.0.1:8008
Cookie: nz-jwt=
Upgrade: websocket
Connection: Upgrade
- Observe that the JSON messages contain entries for all servers from
singleton.ServerShared.GetSortedList(), including servers whoseUserIDdoes not match user A. - Compare with
GET /api/v1/serverusing the same token; that route is filtered throughlistHandler/HasPermissionand should only return user A's own servers.
Cleanup: no persistent state is created by the WebSocket connection.
Local dynamic confirmation note: the full project test/runtime could not be executed in this audit environment because the repository requires Go 1.26 and the local toolchain reported go: download go1.26 for linux/amd64: toolchain not available.
Impact
This is an authenticated horizontal information disclosure. A low-privileged member can continuously monitor other users' server inventory and live telemetry, including host platform details, agent versions, CPU/GPU details, resource usage, traffic counters, country code, and last-active timestamps. This may expose infrastructure composition, usage patterns, and operational state across tenants.
Suggested remediation
Apply object-level authorization in getServerStat for authenticated non-admin users. For each server in the stream, include it only if the current user is admin or server.UserID matches the authenticated user. Keep guest filtering and host redaction for unauthenticated users.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated non-admin users can access full server telemetry via WebSocket due to missing permission checks.
Vulnerability
In Nezha dashboard, the WebSocket route /ws/server is registered under the optional-auth group in cmd/dashboard/controller/controller.go [1]. The handler serverStream in cmd/dashboard/controller/ws.go checks only for any authenticated user (CtxKeyAuthorizedUser) without verifying admin role or server ownership [1]. The getServerStat function then uses a boolean authorized to decide between GetSortedList() (all servers) and GetSortedListForGuest() (filtered). For authenticated members, it returns the full server list with unfiltered host details. This affects all versions prior to the security patch [1][2].
Exploitation
An attacker with any valid authenticated non-admin account can connect to /ws/server WebSocket. No additional privileges, user interaction, or race conditions are required. The server responds with telemetry for all servers, including those owned by other users, without applying the HasPermission filter that the normal REST API enforces [1].
Impact
The attacker gains access to sensitive server telemetry: server ID, name, public note, host details (platform version, agent version, CPU/GPU names, memory/disk/swap totals, architecture, virtualization, boot time, CPU load, etc.), runtime state, country code, and last active time [1]. This information disclosure can expose system configurations and potentially aid further targeted attacks.
Mitigation
The vendor has released a security patch. Users should upgrade to the latest version of Nezha dashboard as detailed in the GitHub advisory [1]. No workarounds are currently documented. Organizations using multi-tenant deployments should prioritize this fix to prevent cross‑tenant data exposure.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.