Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-39386
Published:April 21, 2026
Updated:April 23, 2026
Neko is a a self-hosted virtual browser that runs in Docker and uses WebRTC In versions 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1, any authenticated user can immediately obtain full administrative control of the entire Neko instance (member management, room settings, broadcast control, session termination, etc.). This results in a complete compromise of the instance. The vulnerability has been patched in v3.0.11 and v3.1.2. If upgrading is not immediately possible, the following mitigations can reduce risk: Restrict access to trusted users only (avoid granting accounts to untrusted parties); ensure all user passwords are strong and only shared with trusted individuals; run the instance only when needed; avoid leaving it continuously exposed; place the instance behind authentication layers such as a reverse proxy with additional access controls; disable or restrict access to the /api/profile endpoint if feasible; and/or monitor for suspicious privilege changes or unexpected administrative actions. Note that these are temporary mitigations and do not fully eliminate the vulnerability. Upgrading is strongly recommended.
Affected Packages
https://github.com/m1k1o/neko.git (GITHUB):
Affected version(s) >=v3.1.0 <v3.1.2
Fix Suggestion:
Update to version v3.1.2
https://github.com/m1k1o/neko.git (GITHUB):
Affected version(s) >=v3.0.0 <v3.0.11
Fix Suggestion:
Update to version v3.0.11
github.com/m1k1o/neko/server (GO):
Affected version(s) >=v0.0.0-20250401220545-fe94c999c6af <v0.0.0-20260406184107-c54bcf1ee211
Fix Suggestion:
Update to version v0.0.0-20260406184107-c54bcf1ee211
github.com/m1k1o/neko (GO):
Affected version(s) >=v3.0.0 <v3.0.11
Fix Suggestion:
Update to version v3.0.11
github.com/m1k1o/neko (GO):
Affected version(s) >=v3.1.0 <v3.1.2
Fix Suggestion:
Update to version v3.1.2
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
8.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Input Validation
Authorization Bypass Through User-Controlled Key
Improper Access Control
Improper Privilege Management
Missing Authorization
EPSS
Base Score:
0.05