
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-26114 affects code-server versions before 4.10.1, exposing a Missing Origin Validation vulnerability in WebSockets handshakes. The vulnerability was discovered and disclosed on March 22, 2023, and affects the code-server package distributed through npm (NVD, Snyk).
The vulnerability stems from missing origin validation in WebSocket handshakes, which could allow unauthorized access to code-server instances. The issue has been assigned CWE-346 (Origin Validation Error) and CWE-1385 (Missing Origin Validation in WebSockets). The vulnerability has received a CVSS v3.1 base score of 9.3 (CRITICAL) from NIST and 8.2 (HIGH) from Snyk, with attack vectors being network-based and requiring user interaction (NVD).
When exploited, this vulnerability can allow an adversary to access data from and connect to the code-server instance. The vulnerability is particularly concerning for users of older or niche browsers that do not support SameSite cookies and those who access code-server under a shared domain with other users on separate sub-domains (GitHub Release).
The vulnerability has been patched in version 4.10.1 of code-server. Users should upgrade to this version or higher to mitigate the risk. For those using a reverse proxy, it's essential to ensure that the host header is properly forwarded, as the security fix requires the host header to be set for proper origin validation (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."