Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20.
References
Configurations
Configuration 1 (hide)
|
History
12 Aug 2025, 01:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.hashicorp.com/t/hcsec-2025-09-vault-may-expose-sensitive-information-in-error-logs-when-processing-malformed-data-with-the-kv-v2-plugin - Vendor Advisory | |
First Time |
Hashicorp
Hashicorp vault |
|
CPE | cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:* cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:* |
05 May 2025, 20:54
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-02 15:15
Updated : 2025-08-12 01:44
NVD link : CVE-2025-4166
Mitre link : CVE-2025-4166
CVE.ORG link : CVE-2025-4166
JSON object : View
Products Affected
hashicorp
- vault
CWE
CWE-209
Generation of Error Message Containing Sensitive Information