Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27193: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in feathersjs feathers

0
High
VulnerabilityCVE-2026-27193cvecve-2026-27193cwe-200
Published: Sat Feb 21 2026 (02/21/2026, 04:09:06 UTC)
Source: CVE Database V5
Vendor/Project: feathersjs
Product: feathers

Description

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. In versions 5.0.39 and below, all HTTP request headers are stored in the session cookie, which is signed but not encrypted, exposing internal proxy/gateway headers to clients. The OAuth service stores the complete headers object in the session, then the session is persisted using cookie-session, which base64-encodes the data. While the cookie is signed to prevent tampering, the contents are readable by anyone by simply decoding the base64 value. Under specific deployment configurations (e.g., behind reverse proxies or API gateways), this can lead to exposure of sensitive internal infrastructure details such as API keys, service tokens, and internal IP addresses. This issue has been fixed in version 5.0.40.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 00:47:47 UTC

Technical Analysis

Feathersjs is a popular JavaScript and TypeScript framework for building web APIs and real-time applications. In versions 5.0.39 and earlier, a critical design flaw exists where all HTTP request headers are stored within the session cookie. While the cookie is cryptographically signed to prevent tampering, it is not encrypted, and the data is base64-encoded, making it trivially decodable by any client possessing the cookie. The OAuth service component specifically stores the entire headers object in the session, which is then persisted using the cookie-session middleware. This results in sensitive internal headers—such as those added by reverse proxies or API gateways, including API keys, service tokens, and internal IP addresses—being exposed to unauthorized actors. Since these headers often contain confidential information used for internal authentication and routing, their exposure can lead to significant security risks. The vulnerability does not require authentication or user interaction to exploit but depends on the deployment environment exposing internal headers to the application layer. The flaw has been addressed in feathersjs version 5.0.40 by removing sensitive headers from the session cookie or encrypting the session data. No known exploits are currently reported in the wild, but the high CVSS score of 8.2 reflects the potential severity of this information disclosure.

Potential Impact

The exposure of sensitive internal headers can have severe consequences for organizations using affected versions of feathersjs. Attackers gaining access to API keys, service tokens, or internal IP addresses can leverage this information to bypass security controls, move laterally within internal networks, or launch further targeted attacks such as privilege escalation or data exfiltration. The confidentiality of internal infrastructure is compromised, increasing the risk of unauthorized access to backend services and sensitive data. Since the vulnerability requires no authentication and can be exploited remotely, it broadens the attack surface significantly. Organizations relying on feathersjs for critical web APIs or real-time applications, especially those deployed behind reverse proxies or API gateways, face heightened risk of internal network reconnaissance and subsequent exploitation. This can lead to operational disruption, data breaches, and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade feathersjs to version 5.0.40 or later, where the issue is fixed. Additionally, review and harden deployment configurations to ensure that internal headers are not unnecessarily forwarded to application layers or included in session data. Implement encryption for session cookies rather than relying solely on signing to prevent unauthorized reading of cookie contents. Audit OAuth and session management implementations to avoid storing sensitive headers or tokens in client-accessible storage. Employ network segmentation and strict access controls to limit exposure of internal IP addresses and service tokens. Monitoring and alerting on unusual access patterns or session anomalies can help detect exploitation attempts. Finally, conduct thorough security testing and code reviews for custom middleware that interacts with headers and sessions to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.154Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6999354dbe58cf853b44946b

Added to database: 2/21/2026, 4:32:13 AM

Last enriched: 3/1/2026, 12:47:47 AM

Last updated: 4/8/2026, 1:14:43 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses