Vulnerability Reference
A comprehensive list of security flaws WSHawk is designed to identify and verify.
Broken Authentication
CRITICALDescription: WebSocket connection established without valid session tokens or using hijacked/predictable identifiers.
Remote Code Execution (RCE)
CRITICALDescription: Injection of server-side commands via WebSocket parameters, leading to full system compromise.
Blind XXE & SSRF
HIGH/CRITICALDescription: Exploiting XML parsers or backend requests via WebSocket payloads to access internal data (detected via OAST).
CSWSH Hijacking
HIGHDescription: Server fails to validate 'Origin' headers, allowing malicious sites to hijack WebSocket sessions.
Injection (SQL / NoSQL)
HIGH/CRITICALDescription: Manipulating message structures to execute unauthorized database queries or bypass business logic.
Path Traversal
HIGHDescription: Unauthorized access to file system paths via message parameter manipulation.
Template Injection (SSTI)
HIGH/CRITICALDescription: Injecting malicious template directives into messages that are processed by server-side engines.