CVE-2025-59956

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59956
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-59956.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-59956
Aliases
Downstream
Related
Published
2025-09-29T23:57:08Z
Modified
2025-11-01T02:50:36.949987Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
AgentAPI exposed user chat history via a DNS rebinding attack
Details

AgentAPI is an HTTP API for Claude Code, Goose, Aider, Gemini, Amp, and Codex. Versions 0.3.3 and below are susceptible to a client-side DNS rebinding attack when hosted over plain HTTP on localhost. An attacker can gain access to the /messages endpoint served by the Agent API. This allows for the unauthorized exfiltration of sensitive user data, specifically local message history, which can include secret keys, file system contents, and intellectual property the user was working on locally. This issue is fixed in version 0.4.0.

Database specific
{
    "cwe_ids": [
        "CWE-350"
    ]
}
References

Affected packages

Git / github.com/coder/agentapi

Affected ranges

Type
GIT
Repo
https://github.com/coder/agentapi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

preview

v0.*

v0.1.0
v0.1.0-pre0
v0.1.0-pre1
v0.2.0
v0.2.1
v0.2.2
v0.2.3
v0.3.0
v0.3.1
v0.3.2
v0.3.3