CVE-2025-4166

Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20.
Configurations

No configuration.

History

05 May 2025, 20:54

Type Values Removed Values Added
Summary
  • (es) El complemento Clave/Valor (kv) versión 2 de Vault Community y Vault Enterprise podría exponer involuntariamente información confidencial en los registros del servidor y de auditoría cuando los usuarios envían payloads malformadas durante la creación o actualización de secretos mediante la API REST de Vault. Esta vulnerabilidad, identificada como CVE-2025-4166, está corregida en Vault Community 1.19.3 y Vault Enterprise 1.19.3, 1.18.9, 1.17.16 y 1.16.20.

02 May 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-02 15:15

Updated : 2025-05-05 20:54


NVD link : CVE-2025-4166

Mitre link : CVE-2025-4166

CVE.ORG link : CVE-2025-4166


JSON object : View

Products Affected

No product.

CWE
CWE-209

Generation of Error Message Containing Sensitive Information