CVE Vulnerabilities

CVE-2025-50200

Insertion of Sensitive Information into Log File

Published: Jun 19, 2025 | Modified: Aug 06, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
4.4 MODERATE
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

RabbitMQ is a messaging and streaming broker. In versions 3.13.7 and prior, RabbitMQ is logging authorization headers in plaintext encoded in base64. When querying RabbitMQ api with HTTP/s with basic authentication it creates logs with all headers in request, including authorization headers which show base64 encoded username:password. This is easy to decode and afterwards could be used to obtain control to the system depending on credentials. This issue has been patched in version 4.0.8.

Weakness

The product writes sensitive information to a log file.

Affected Software

NameVendorStart VersionEnd Version
Rabbitmq_serverBroadcom*4.0.8 (excluding)
Rabbitmq-serverUbuntudevel*
Rabbitmq-serverUbuntuoracular*
Rabbitmq-serverUbuntuplucky*
Rabbitmq-serverUbuntuupstream*

Potential Mitigations

References