RabbitMQ is a messaging and streaming broker. In versions 3.13.7 and prior, RabbitMQ is logging authorization headers in plaintext encoded in base64. When querying RabbitMQ api with HTTP/s with basic authentication it creates logs with all headers in request, including authorization headers which show base64 encoded username:password. This is easy to decode and afterwards could be used to obtain control to the system depending on credentials. This issue has been patched in version 4.0.8.
References
Link | Resource |
---|---|
https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-gh3x-4x42-fvq8 | Exploit Vendor Advisory |
Configurations
History
06 Aug 2025, 18:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:* | |
First Time |
Broadcom
Broadcom rabbitmq Server |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-gh3x-4x42-fvq8 - Exploit, Vendor Advisory |
23 Jun 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Jun 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-19 17:15
Updated : 2025-08-06 18:28
NVD link : CVE-2025-50200
Mitre link : CVE-2025-50200
CVE.ORG link : CVE-2025-50200
JSON object : View
Products Affected
broadcom
- rabbitmq_server
CWE
CWE-532
Insertion of Sensitive Information into Log File