Home

Description

Gitpod is a developer platform for cloud development environments. In versions before main-gha.33628 for both Gitpod Classic and Gitpod Classic Enterprise, OAuth integration with Bitbucket in certain conditions allowed a crafted link to expose a valid Bitbucket access token via the URL fragment when clicked by an authenticated user. This resulted from how Bitbucket returned tokens and how Gitpod handled the redirect flow. The issue was limited to Bitbucket (GitHub and GitLab integrations were not affected), required user interaction, and has been mitigated through redirect handling and OAuth logic hardening. The issue was resolved in main-gha.33628 and later. There are no workarounds.

PUBLISHED Reserved 2025-08-14 | Published 2025-08-29 | Updated 2025-08-29 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

Gitpod Classic < main-gha.33628
affected

Gitpod Classic Enterprise < main-gha.33628
affected

References

github.com/...gitpod/security/advisories/GHSA-63fw-3jgp-2p2g

github.com/gitpod-io/gitpod/pull/20983

github.com/...ommit/a736c1b83bd781786af0da705d0acebabfba7862

cve.org (CVE-2025-55750)

nvd.nist.gov (CVE-2025-55750)

Download JSON