ghsa-w64r-2g3w-w8w4
Vulnerability from github
Published
2025-09-29 20:40
Modified
2025-09-30 15:16
Severity ?
Summary
Coder AgentAPI exposed user chat history via a DNS rebinding attack
Details
Summary
AgentAPI prior to version 0.4.0 was susceptible to a client-side DNS rebinding attack when hosted over plain HTTP on localhost.
Impact
An attacker could have gained access to the /messages
endpoint served by the Agent API. This allowed for the unauthorized exfiltration of sensitive user data, specifically local message history, which could've included secret keys, file system contents, and intellectual property the user was working on locally.
Remediation
We've implemented an Origin
and Host
header validating middleware and set a secure by default configuration.
Please upgrade to version 0.4.0 or later.
Credits
We'd like to thank Evan Harris from mcpsec.dev for reporting this issue and following the coordinated disclosure policy.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/coder/agentapi" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.4.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-59956" ], "database_specific": { "cwe_ids": [ "CWE-350" ], "github_reviewed": true, "github_reviewed_at": "2025-09-29T20:40:26Z", "nvd_published_at": "2025-09-30T11:37:41Z", "severity": "MODERATE" }, "details": "### Summary\nAgentAPI prior to version [0.4.0](https://github.com/coder/agentapi/releases/tag/v0.4.0) was susceptible to a client-side DNS rebinding attack when hosted over plain HTTP on localhost.\n\n### Impact\nAn attacker could have gained access to the `/messages` endpoint served by the Agent API. This allowed for the unauthorized exfiltration of sensitive user data, specifically local message history, which could\u0027ve included secret keys, file system contents, and intellectual property the user was working on locally.\n\n### Remediation\nWe\u0027ve [implemented](https://github.com/coder/agentapi/pull/49) an `Origin` and `Host` header validating middleware and set a secure by default configuration.\n\nPlease upgrade to version [0.4.0](https://github.com/coder/agentapi/releases/tag/v0.4.0) or later.\n\n### Credits\nWe\u0027d like to thank [Evan Harris](https://github.com/eharris128) from [mcpsec.dev](https://mcpsec.dev/) for reporting this issue and following the coordinated disclosure [policy](https://coder.com/security/policy).", "id": "GHSA-w64r-2g3w-w8w4", "modified": "2025-09-30T15:16:20Z", "published": "2025-09-29T20:40:26Z", "references": [ { "type": "WEB", "url": "https://github.com/coder/agentapi/security/advisories/GHSA-w64r-2g3w-w8w4" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59956" }, { "type": "WEB", "url": "https://github.com/coder/agentapi/pull/49" }, { "type": "WEB", "url": "https://github.com/coder/agentapi/commit/5c425c62447b8a9eac19e9fc5a2eae7f0803f149" }, { "type": "WEB", "url": "https://github.blog/security/application-security/localhost-dangers-cors-and-dns-rebinding" }, { "type": "PACKAGE", "url": "https://github.com/coder/agentapi" }, { "type": "WEB", "url": "https://github.com/coder/agentapi/releases/tag/v0.4.0" }, { "type": "WEB", "url": "https://mcpsec.dev/advisories/2025-09-19-coder-chat-exfiltration" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Coder AgentAPI exposed user chat history via a DNS rebinding attack" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.