Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27193: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in feathersjs feathers

0
High
VulnerabilityCVE-2026-27193cvecve-2026-27193cwe-200
Published: Sat Feb 21 2026 (02/21/2026, 04:09:06 UTC)
Source: CVE Database V5
Vendor/Project: feathersjs
Product: feathers

Description

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. In versions 5.0.39 and below, all HTTP request headers are stored in the session cookie, which is signed but not encrypted, exposing internal proxy/gateway headers to clients. The OAuth service stores the complete headers object in the session, then the session is persisted using cookie-session, which base64-encodes the data. While the cookie is signed to prevent tampering, the contents are readable by anyone by simply decoding the base64 value. Under specific deployment configurations (e.g., behind reverse proxies or API gateways), this can lead to exposure of sensitive internal infrastructure details such as API keys, service tokens, and internal IP addresses. This issue has been fixed in version 5.0.40.

AI-Powered Analysis

AILast updated: 02/21/2026, 04:46:39 UTC

Technical Analysis

Feathersjs is a popular framework for building web APIs and real-time applications using JavaScript or TypeScript. In versions 5.0.39 and earlier, a critical vulnerability (CVE-2026-27193) exists due to the way HTTP request headers are handled within the session management system. Specifically, the OAuth service stores the entire HTTP headers object in the session, which is then persisted using the cookie-session middleware. While the session cookie is signed to prevent tampering, it is not encrypted and is base64-encoded, making it trivially decodable by anyone with access to the cookie. This design flaw leads to exposure of sensitive internal headers, including internal proxy or gateway headers that may contain API keys, service tokens, internal IP addresses, or other confidential infrastructure details. The vulnerability is particularly impactful in deployment scenarios where Feathersjs applications are placed behind reverse proxies or API gateways that add sensitive headers. Attackers can exploit this by simply reading the session cookie from the client side, without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 score of 8.2 (high severity), reflecting the significant confidentiality impact and the complexity of attack due to specific deployment requirements. The issue was addressed and fixed in Feathersjs version 5.0.40 by presumably removing sensitive headers from the session cookie or encrypting the cookie contents.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive internal information such as API keys, service tokens, and internal network details. This exposure can facilitate further attacks, including unauthorized access to backend services, lateral movement within internal networks, and compromise of other connected systems. Organizations using vulnerable Feathersjs versions in environments behind reverse proxies or API gateways are at risk of leaking critical infrastructure details to attackers who can capture or access client-side cookies. This can undermine confidentiality and potentially lead to broader security breaches. The vulnerability does not directly affect integrity or availability but significantly compromises confidentiality, which can cascade into more severe attacks. Since no authentication or user interaction is required, the attack surface is broad, though the complexity is elevated by the need for specific deployment configurations. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of patching due to the high severity and ease of cookie decoding.

Mitigation Recommendations

Organizations should immediately upgrade Feathersjs to version 5.0.40 or later, where this vulnerability is fixed. Until upgrading, a practical mitigation is to avoid storing sensitive headers in session cookies or to implement encryption for cookie contents to prevent plaintext exposure. Reviewing and minimizing the headers added by reverse proxies or API gateways can reduce sensitive data exposure. Additionally, configuring cookies with the Secure and HttpOnly flags can help prevent interception and client-side script access, though this does not prevent base64 decoding if the cookie is accessible. Network segmentation and strict access controls on internal services can limit the impact if sensitive information is leaked. Monitoring for unusual access patterns or attempts to read session cookies can provide early detection. Finally, auditing OAuth service configurations and session management practices to ensure no sensitive data is stored client-side is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.154Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6999354dbe58cf853b44946b

Added to database: 2/21/2026, 4:32:13 AM

Last enriched: 2/21/2026, 4:46:39 AM

Last updated: 2/22/2026, 6:51:40 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats