CVE-2025-8864
BaseFortify
Publication date: 2025-08-11
Last updated on: 2025-08-11
Assigner: Yugabyte, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| yugabyte | yugabytedb_anywhere | * |
| yugabyte | yugabytedb | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-532 | The product writes sensitive information to a log file. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Shared Access Signature (SAS) token not being masked in the backup configuration response and also being exposed in the yb_backup logs. This means that sensitive authentication tokens used for access control are visible in backup-related outputs and logs, potentially allowing unauthorized users who can access these logs or responses to obtain the token and misuse it.
How can this vulnerability impact me? :
The exposure of the Shared Access Signature token in backup configuration responses and logs can lead to unauthorized access to backup resources or data. If an attacker obtains the token, they could potentially access, modify, or delete backups, leading to data breaches, data loss, or disruption of backup and restore operations.