Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w64r-2g3w-w8w4

Опубликовано: 29 сент. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Coder AgentAPI exposed user chat history via a DNS rebinding attack

Summary

AgentAPI prior to version 0.4.0 was susceptible to a client-side DNS rebinding attack when hosted over plain HTTP on localhost.

Impact

An attacker could have gained access to the /messages endpoint served by the Agent API. This allowed for the unauthorized exfiltration of sensitive user data, specifically local message history, which could've included secret keys, file system contents, and intellectual property the user was working on locally.

Remediation

We've implemented an Origin and Host header validating middleware and set a secure by default configuration.

Please upgrade to version 0.4.0 or later.

Credits

We'd like to thank Evan Harris from mcpsec.dev for reporting this issue and following the coordinated disclosure policy.

Пакеты

Наименование

github.com/coder/agentapi

go
Затронутые версииВерсия исправления

< 0.4.0

0.4.0

EPSS

Процентиль: 23%
0.00079
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-290
CWE-350

Связанные уязвимости

CVSS3: 6.5
nvd
4 месяца назад

AgentAPI is an HTTP API for Claude Code, Goose, Aider, Gemini, Amp, and Codex. Versions 0.3.3 and below are susceptible to a client-side DNS rebinding attack when hosted over plain HTTP on localhost. An attacker can gain access to the /messages endpoint served by the Agent API. This allows for the unauthorized exfiltration of sensitive user data, specifically local message history, which can include secret keys, file system contents, and intellectual property the user was working on locally. This issue is fixed in version 0.4.0.

EPSS

Процентиль: 23%
0.00079
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-290
CWE-350