CVE-2025-59956: CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action in coder agentapi
AgentAPI is an HTTP API for Claude Code, Goose, Aider, Gemini, Amp, and Codex. Versions 0.3.3 and below are susceptible to a client-side DNS rebinding attack when hosted over plain HTTP on localhost. An attacker can gain access to the /messages endpoint served by the Agent API. This allows for the unauthorized exfiltration of sensitive user data, specifically local message history, which can include secret keys, file system contents, and intellectual property the user was working on locally. This issue is fixed in version 0.4.0.
AI Analysis
Technical Summary
CVE-2025-59956 is a medium-severity vulnerability affecting versions 0.3.3 and below of the AgentAPI component developed by coder. AgentAPI is an HTTP API used by several AI coding assistant products such as Claude Code, Goose, Aider, Gemini, Amp, and Codex. The vulnerability arises from a reliance on reverse DNS resolution for security-critical decisions, categorized under CWE-350. Specifically, when AgentAPI is hosted over plain HTTP on localhost, it is susceptible to a client-side DNS rebinding attack. DNS rebinding is a technique where an attacker manipulates DNS responses to make a victim's browser believe that a malicious domain resolves to a trusted local IP address, thereby bypassing same-origin policies. In this case, an attacker can exploit this flaw to access the /messages endpoint of the AgentAPI, which is intended to be accessible only locally. This endpoint contains sensitive user data including local message history, secret keys, file system contents, and intellectual property that the user is working on. The vulnerability does not require authentication but does require user interaction (e.g., visiting a malicious webpage). The CVSS v3.1 score is 6.5, reflecting a network attack vector with low complexity, no privileges required, but user interaction needed. The impact is primarily on confidentiality, with no direct integrity or availability impact. The issue is fixed in AgentAPI version 0.4.0. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality of sensitive intellectual property and secret keys stored or processed locally by developers using affected AI coding assistants. Since these tools are used to accelerate software development and may handle proprietary code and credentials, unauthorized exfiltration could lead to intellectual property theft, leakage of sensitive credentials, and potential downstream supply chain risks. The attack requires user interaction, so phishing or social engineering could be leveraged to lure developers into visiting malicious sites. The fact that the API is hosted on localhost and assumed to be secure by design may lead to a false sense of security, increasing the risk of successful exploitation. Organizations with remote or hybrid workforces using these tools over unsecured networks may be particularly vulnerable. The absence of integrity or availability impact limits the scope to data confidentiality, but the sensitivity of the data involved elevates the concern. The medium severity rating suggests that while not critical, the vulnerability warrants prompt remediation to prevent targeted attacks against valuable development assets.
Mitigation Recommendations
European organizations should immediately upgrade all instances of AgentAPI to version 0.4.0 or later to eliminate the vulnerability. Until upgrade is possible, organizations should enforce strict network controls to prevent untrusted web content from initiating DNS rebinding attacks, such as implementing DNS pinning or restricting DNS responses to trusted IP ranges. Developers should be educated about the risks of visiting untrusted websites while running vulnerable versions of AgentAPI. Additionally, hosting AgentAPI over HTTPS rather than plain HTTP on localhost can mitigate the attack vector by preventing interception and manipulation of DNS responses. Network segmentation and endpoint protection solutions should monitor for suspicious DNS rebinding patterns. Organizations should also audit the usage of affected AI coding assistants and restrict their use to trusted environments. Finally, sensitive keys and intellectual property should be stored using secure vaults or encrypted containers to reduce exposure in case of local API compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Ireland
CVE-2025-59956: CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action in coder agentapi
Description
AgentAPI is an HTTP API for Claude Code, Goose, Aider, Gemini, Amp, and Codex. Versions 0.3.3 and below are susceptible to a client-side DNS rebinding attack when hosted over plain HTTP on localhost. An attacker can gain access to the /messages endpoint served by the Agent API. This allows for the unauthorized exfiltration of sensitive user data, specifically local message history, which can include secret keys, file system contents, and intellectual property the user was working on locally. This issue is fixed in version 0.4.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-59956 is a medium-severity vulnerability affecting versions 0.3.3 and below of the AgentAPI component developed by coder. AgentAPI is an HTTP API used by several AI coding assistant products such as Claude Code, Goose, Aider, Gemini, Amp, and Codex. The vulnerability arises from a reliance on reverse DNS resolution for security-critical decisions, categorized under CWE-350. Specifically, when AgentAPI is hosted over plain HTTP on localhost, it is susceptible to a client-side DNS rebinding attack. DNS rebinding is a technique where an attacker manipulates DNS responses to make a victim's browser believe that a malicious domain resolves to a trusted local IP address, thereby bypassing same-origin policies. In this case, an attacker can exploit this flaw to access the /messages endpoint of the AgentAPI, which is intended to be accessible only locally. This endpoint contains sensitive user data including local message history, secret keys, file system contents, and intellectual property that the user is working on. The vulnerability does not require authentication but does require user interaction (e.g., visiting a malicious webpage). The CVSS v3.1 score is 6.5, reflecting a network attack vector with low complexity, no privileges required, but user interaction needed. The impact is primarily on confidentiality, with no direct integrity or availability impact. The issue is fixed in AgentAPI version 0.4.0. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality of sensitive intellectual property and secret keys stored or processed locally by developers using affected AI coding assistants. Since these tools are used to accelerate software development and may handle proprietary code and credentials, unauthorized exfiltration could lead to intellectual property theft, leakage of sensitive credentials, and potential downstream supply chain risks. The attack requires user interaction, so phishing or social engineering could be leveraged to lure developers into visiting malicious sites. The fact that the API is hosted on localhost and assumed to be secure by design may lead to a false sense of security, increasing the risk of successful exploitation. Organizations with remote or hybrid workforces using these tools over unsecured networks may be particularly vulnerable. The absence of integrity or availability impact limits the scope to data confidentiality, but the sensitivity of the data involved elevates the concern. The medium severity rating suggests that while not critical, the vulnerability warrants prompt remediation to prevent targeted attacks against valuable development assets.
Mitigation Recommendations
European organizations should immediately upgrade all instances of AgentAPI to version 0.4.0 or later to eliminate the vulnerability. Until upgrade is possible, organizations should enforce strict network controls to prevent untrusted web content from initiating DNS rebinding attacks, such as implementing DNS pinning or restricting DNS responses to trusted IP ranges. Developers should be educated about the risks of visiting untrusted websites while running vulnerable versions of AgentAPI. Additionally, hosting AgentAPI over HTTPS rather than plain HTTP on localhost can mitigate the attack vector by preventing interception and manipulation of DNS responses. Network segmentation and endpoint protection solutions should monitor for suspicious DNS rebinding patterns. Organizations should also audit the usage of affected AI coding assistants and restrict their use to trusted environments. Finally, sensitive keys and intellectual property should be stored using secure vaults or encrypted containers to reduce exposure in case of local API compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-23T14:33:49.506Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68db2175a473ffe031e293b0
Added to database: 9/30/2025, 12:16:53 AM
Last enriched: 9/30/2025, 12:32:21 AM
Last updated: 9/30/2025, 2:01:52 AM
Views: 5
Related Threats
HTTP/2 2.0 - Denial Of Service (DOS)
MediumMbed TLS 3.6.4 - Use-After-Free
MediumConcrete CMS 9.4.3 - Stored XSS
MediumELEX WooCommerce WordPress Plugin 1.4.3 - SQL Injection
MediumdotCMS 25.07.02-1 - Authenticated Blind SQL Injection
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.