CVE-2026-27193: Feathers exposes internal headers via unencrypted session cookie
(updated )
All HTTP request headers are stored in the session cookie, which is signed but not encrypted, exposing internal proxy/gateway headers to clients.
The OAuth service stores the complete headers object in the session:
// https://github.com/feathersjs/feathers/blob/dove/packages/authentication-oauth/src/service.ts#L173
session.headers = headers;
The session is persisted using cookie-session, which base64-encodes the data. While the cookie is signed to prevent tampering, the contents are readable by anyone by simply decoding the base64 value.
Under specific deployment configurations (e.g., behind reverse proxies or API gateways), this can lead to exposure of sensitive internal infrastructure details such as API keys, service tokens, and internal IP addresses.
Credits: Abdelwahed Madani Yousfi (@vvxhid) / Edoardo Geraci (@b0-n0-b0) / Thomas Rinsma (@ThomasRinsma) From Codean Labs.
References
- github.com/advisories/GHSA-9m9c-vpv5-9g85
- github.com/feathersjs/feathers
- github.com/feathersjs/feathers/commit/ee19a0ae9bc2ebf23b1fe598a1f7361981b65401
- github.com/feathersjs/feathers/releases/tag/v5.0.40
- github.com/feathersjs/feathers/security/advisories/GHSA-9m9c-vpv5-9g85
- nvd.nist.gov/vuln/detail/CVE-2026-27193
Code Behaviors & Features
Detect and mitigate CVE-2026-27193 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →