Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20.
References
Configurations
No configuration.
History
05 May 2025, 20:54
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-02 15:15
Updated : 2025-05-05 20:54
NVD link : CVE-2025-4166
Mitre link : CVE-2025-4166
CVE.ORG link : CVE-2025-4166
JSON object : View
Products Affected
No product.
CWE
CWE-209
Generation of Error Message Containing Sensitive Information