CVE-2026-27193: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in feathersjs feathers
Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. In versions 5.0.39 and below, all HTTP request headers are stored in the session cookie, which is signed but not encrypted, exposing internal proxy/gateway headers to clients. The OAuth service stores the complete headers object in the session, then the session is persisted using cookie-session, which base64-encodes the data. While the cookie is signed to prevent tampering, the contents are readable by anyone by simply decoding the base64 value. Under specific deployment configurations (e.g., behind reverse proxies or API gateways), this can lead to exposure of sensitive internal infrastructure details such as API keys, service tokens, and internal IP addresses. This issue has been fixed in version 5.0.40.
AI Analysis
Technical Summary
Feathersjs is a popular JavaScript and TypeScript framework for building web APIs and real-time applications. In versions 5.0.39 and earlier, a critical design flaw exists where all HTTP request headers are stored within the session cookie. While the cookie is cryptographically signed to prevent tampering, it is not encrypted, and the data is base64-encoded, making it trivially decodable by any client possessing the cookie. The OAuth service component specifically stores the entire headers object in the session, which is then persisted using the cookie-session middleware. This results in sensitive internal headers—such as those added by reverse proxies or API gateways, including API keys, service tokens, and internal IP addresses—being exposed to unauthorized actors. Since these headers often contain confidential information used for internal authentication and routing, their exposure can lead to significant security risks. The vulnerability does not require authentication or user interaction to exploit but depends on the deployment environment exposing internal headers to the application layer. The flaw has been addressed in feathersjs version 5.0.40 by removing sensitive headers from the session cookie or encrypting the session data. No known exploits are currently reported in the wild, but the high CVSS score of 8.2 reflects the potential severity of this information disclosure.
Potential Impact
The exposure of sensitive internal headers can have severe consequences for organizations using affected versions of feathersjs. Attackers gaining access to API keys, service tokens, or internal IP addresses can leverage this information to bypass security controls, move laterally within internal networks, or launch further targeted attacks such as privilege escalation or data exfiltration. The confidentiality of internal infrastructure is compromised, increasing the risk of unauthorized access to backend services and sensitive data. Since the vulnerability requires no authentication and can be exploited remotely, it broadens the attack surface significantly. Organizations relying on feathersjs for critical web APIs or real-time applications, especially those deployed behind reverse proxies or API gateways, face heightened risk of internal network reconnaissance and subsequent exploitation. This can lead to operational disruption, data breaches, and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade feathersjs to version 5.0.40 or later, where the issue is fixed. Additionally, review and harden deployment configurations to ensure that internal headers are not unnecessarily forwarded to application layers or included in session data. Implement encryption for session cookies rather than relying solely on signing to prevent unauthorized reading of cookie contents. Audit OAuth and session management implementations to avoid storing sensitive headers or tokens in client-accessible storage. Employ network segmentation and strict access controls to limit exposure of internal IP addresses and service tokens. Monitoring and alerting on unusual access patterns or session anomalies can help detect exploitation attempts. Finally, conduct thorough security testing and code reviews for custom middleware that interacts with headers and sessions to prevent similar issues.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-27193: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in feathersjs feathers
Description
Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. In versions 5.0.39 and below, all HTTP request headers are stored in the session cookie, which is signed but not encrypted, exposing internal proxy/gateway headers to clients. The OAuth service stores the complete headers object in the session, then the session is persisted using cookie-session, which base64-encodes the data. While the cookie is signed to prevent tampering, the contents are readable by anyone by simply decoding the base64 value. Under specific deployment configurations (e.g., behind reverse proxies or API gateways), this can lead to exposure of sensitive internal infrastructure details such as API keys, service tokens, and internal IP addresses. This issue has been fixed in version 5.0.40.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Feathersjs is a popular JavaScript and TypeScript framework for building web APIs and real-time applications. In versions 5.0.39 and earlier, a critical design flaw exists where all HTTP request headers are stored within the session cookie. While the cookie is cryptographically signed to prevent tampering, it is not encrypted, and the data is base64-encoded, making it trivially decodable by any client possessing the cookie. The OAuth service component specifically stores the entire headers object in the session, which is then persisted using the cookie-session middleware. This results in sensitive internal headers—such as those added by reverse proxies or API gateways, including API keys, service tokens, and internal IP addresses—being exposed to unauthorized actors. Since these headers often contain confidential information used for internal authentication and routing, their exposure can lead to significant security risks. The vulnerability does not require authentication or user interaction to exploit but depends on the deployment environment exposing internal headers to the application layer. The flaw has been addressed in feathersjs version 5.0.40 by removing sensitive headers from the session cookie or encrypting the session data. No known exploits are currently reported in the wild, but the high CVSS score of 8.2 reflects the potential severity of this information disclosure.
Potential Impact
The exposure of sensitive internal headers can have severe consequences for organizations using affected versions of feathersjs. Attackers gaining access to API keys, service tokens, or internal IP addresses can leverage this information to bypass security controls, move laterally within internal networks, or launch further targeted attacks such as privilege escalation or data exfiltration. The confidentiality of internal infrastructure is compromised, increasing the risk of unauthorized access to backend services and sensitive data. Since the vulnerability requires no authentication and can be exploited remotely, it broadens the attack surface significantly. Organizations relying on feathersjs for critical web APIs or real-time applications, especially those deployed behind reverse proxies or API gateways, face heightened risk of internal network reconnaissance and subsequent exploitation. This can lead to operational disruption, data breaches, and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade feathersjs to version 5.0.40 or later, where the issue is fixed. Additionally, review and harden deployment configurations to ensure that internal headers are not unnecessarily forwarded to application layers or included in session data. Implement encryption for session cookies rather than relying solely on signing to prevent unauthorized reading of cookie contents. Audit OAuth and session management implementations to avoid storing sensitive headers or tokens in client-accessible storage. Employ network segmentation and strict access controls to limit exposure of internal IP addresses and service tokens. Monitoring and alerting on unusual access patterns or session anomalies can help detect exploitation attempts. Finally, conduct thorough security testing and code reviews for custom middleware that interacts with headers and sessions to prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-18T19:47:02.154Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6999354dbe58cf853b44946b
Added to database: 2/21/2026, 4:32:13 AM
Last enriched: 3/1/2026, 12:47:47 AM
Last updated: 4/8/2026, 1:14:43 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.