CVE-2025-62232
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-31

Last updated on: 2025-11-05

Assigner: Apache Software Foundation

Description
Sensitive data exposure via logging in basic-auth leads to plaintext usernames and passwords written to error logs and forwarded to log sinks when log level is INFO/DEBUG. This creates a high risk of credential compromise through log access. It has been fixed in the following commit:Β  https://github.com/apache/apisix/pull/12629 Users are recommended to upgrade to version 3.14, which fixes this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2025-11-05
Generated
2026-05-07
AI Q&A
2025-10-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache apisix From 1.0 (inc) to 3.14.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-532 The product writes sensitive information to a log file.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Apache APISIX's basic-auth plugin causes sensitive data exposure by logging plaintext usernames and passwords to error logs and log sinks when the log level is set to INFO or DEBUG. This means that credentials can be compromised if unauthorized users gain access to these logs. [2]


How can this vulnerability impact me? :

The vulnerability can lead to credential compromise because sensitive usernames and passwords are stored in plaintext within logs. If an attacker or unauthorized party accesses these logs, they can obtain valid credentials, potentially leading to unauthorized access to systems or data. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking your Apache APISIX logs for plaintext usernames and passwords in error logs when the log level is set to INFO or DEBUG. Specifically, search the error logs for basic-auth credentials exposure. For example, use commands like: grep -i 'basic-auth' /path/to/apisix/logs/error.log or grep -E 'username|password' /path/to/apisix/logs/error.log to identify sensitive data exposure. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Apache APISIX to version 3.14, which contains the fix for this vulnerability. Additionally, avoid setting the log level to INFO or DEBUG in production environments to prevent sensitive data from being logged. Review and restrict access to existing logs that may contain exposed credentials. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart