CVE-2025-47269: code-server's session cookie can be extracted by having user visit specially crafted proxy URL
A maliciously crafted URL using the proxy
subpath can result in the attacker gaining access to the session token.
References
- github.com/advisories/GHSA-p483-wpfp-42cj
- github.com/coder/code-server
- github.com/coder/code-server/commit/47d6d3ada5aadef6d221f3d612401eb3dad9299e
- github.com/coder/code-server/releases/tag/v4.99.4
- github.com/coder/code-server/security/advisories/GHSA-p483-wpfp-42cj
- nvd.nist.gov/vuln/detail/CVE-2025-47269
Code Behaviors & Features
Detect and mitigate CVE-2025-47269 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →