CVE-2025-59956
30.09.2025, 11:37
AgentAPI is an HTTP API for Claude Code, Goose, Aider, Gemini, Amp, and Codex. Versions 0.3.3 and below are susceptible to a client-side DNS rebinding attack when hosted over plain HTTP on localhost. An attacker can gain access to the /messages endpoint served by the Agent API. This allows for the unauthorized exfiltration of sensitive user data, specifically local message history, which can include secret keys, file system contents, and intellectual property the user was working on locally. This issue is fixed in version 0.4.0.Enginsight
| Vendor | Product | Version |
|---|---|---|
| coder | agentapi | 𝑥 < 0.4.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-350 - Reliance on Reverse DNS Resolution for a Security-Critical ActionThe software performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address is truly associated with the hostname.
- CWE-290 - Authentication Bypass by SpoofingThis attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.
References