Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20.
History

Mon, 05 May 2025 14:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 02 May 2025 15:00:00 +0000

Type Values Removed Values Added
Description Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20.
Title Vault May Include Sensitive Data in Error Logs When Using the KV v2 Plugin
Weaknesses CWE-209
References
Metrics cvssV3_1

{'score': 4.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HashiCorp

Published: 2025-05-02T14:57:58.710Z

Updated: 2025-05-02T14:57:58.710Z

Reserved: 2025-04-30T21:43:10.413Z

Link: CVE-2025-4166

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-02T15:15:50.313

Modified: 2025-05-05T20:54:45.973

Link: CVE-2025-4166

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-05-02T14:57:58Z

Links: CVE-2025-4166 - Bugzilla