Skip to content

x/vulndb: potential Go vuln in github.com/coder/coder/v2: GHSA-3rw9-wmc8-8948 #3921

@GoVulnBot

Description

@GoVulnBot

Advisory GHSA-3rw9-wmc8-8948 references a vulnerability in the following Go modules:

Module
github.com/coder/coder
github.com/coder/coder/v2

Description:

Summary

If users log in to Coder via OIDC, and the OpenID Identity Provider does not return a refresh token, then Coder may allow their web session to continue beyond the expiration of the token returned by the OpenID Identity Provider.

Details

When a user logs in via OIDC, Coder stores the OIDC token and refresh token (if any) in its datastore and sets an APIKey in the user's cookies. If there is a refresh token, then when the OIDC token is expired and a request is made with the APIKey, we attempt to refresh the OIDC token. If refresh fails, the Coder API request is also failed and t...

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/coder/coder
      vulnerable_at: 0.27.3
    - module: github.com/coder/coder/v2
      versions:
        - fixed: 2.23.0
      vulnerable_at: 2.22.1
summary: |-
    Coder accepts an APIKey beyond the linked OIDC expiry if there is no refresh
    token in github.com/coder/coder
ghsas:
    - GHSA-3rw9-wmc8-8948
references:
    - advisory: https://github.com/advisories/GHSA-3rw9-wmc8-8948
    - advisory: https://github.com/coder/coder/security/advisories/GHSA-3rw9-wmc8-8948
    - fix: https://github.com/coder/coder/commit/1a4160803589034ce1518e24a78f232c8d08f996
source:
    id: GHSA-3rw9-wmc8-8948
    created: 2025-08-28T20:01:10.976047184Z
review_status: UNREVIEWED

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions