Impact
In certain conditions, Gitpod Classic’s OAuth integration with Bitbucket allowed a crafted link to expose a valid Bitbucket access token via the URL fragment when clicked by an authenticated user. This resulted from how Bitbucket returned tokens and how Gitpod handled the redirect flow.
The issue was limited to Bitbucket (GitHub and GitLab integrations were not affected), required user interaction, and has been mitigated through redirect handling and OAuth logic hardening. No evidence of exploitation has been observed.
Affected Products
• Gitpod Classic (hosted at gitpod.io)
• Gitpod Classic Enterprise (self-hosted)
Patches
The issue was resolved in main-gha.33628 and later.
Fix PR #20983
Mitigation Guidance (Bitbucket OAuth)
If you’ve previously signed into Gitpod using Bitbucket — whether on gitpod.io or in a self-hosted Classic deployment — we recommend revoking and reauthorizing Gitpod as a precaution:
1. Visit Bitbucket’s Authorized Applications page
2. Locate your Gitpod OAuth app in the list
• For gitpod.io, this will be the official Gitpod app
• For self-hosted instances, this may be a custom OAuth app
3. Click Revoke Access
4. Sign back into Gitpod via Bitbucket to generate a new token
Workarounds
There are no reliable workarounds. Mitigation requires updating to a patched version of Gitpod Classic and Classic Enterprise.
References
• #20983
• Gitpod Trust Center Advisory
Impact
In certain conditions, Gitpod Classic’s OAuth integration with Bitbucket allowed a crafted link to expose a valid Bitbucket access token via the URL fragment when clicked by an authenticated user. This resulted from how Bitbucket returned tokens and how Gitpod handled the redirect flow.
The issue was limited to Bitbucket (GitHub and GitLab integrations were not affected), required user interaction, and has been mitigated through redirect handling and OAuth logic hardening. No evidence of exploitation has been observed.
Affected Products
• Gitpod Classic (hosted at gitpod.io)
• Gitpod Classic Enterprise (self-hosted)
Patches
The issue was resolved in main-gha.33628 and later.
Fix PR #20983
Mitigation Guidance (Bitbucket OAuth)
If you’ve previously signed into Gitpod using Bitbucket — whether on gitpod.io or in a self-hosted Classic deployment — we recommend revoking and reauthorizing Gitpod as a precaution:
1. Visit Bitbucket’s Authorized Applications page
2. Locate your Gitpod OAuth app in the list
• For gitpod.io, this will be the official Gitpod app
• For self-hosted instances, this may be a custom OAuth app
3. Click Revoke Access
4. Sign back into Gitpod via Bitbucket to generate a new token
Workarounds
There are no reliable workarounds. Mitigation requires updating to a patched version of Gitpod Classic and Classic Enterprise.
References
• #20983
• Gitpod Trust Center Advisory