CVE-2026-25211
Unknown Unknown - Not Provided
Information Disclosure in Llama Stack Logs Exposes pgvector Password

Publication date: 2026-01-30

Last updated on: 2026-01-30

Assigner: MITRE

Description
Llama Stack (aka llama-stack) before 0.4.0rc3 does not censor the pgvector password in the initialization log.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-30
Last Modified
2026-01-30
Generated
2026-05-07
AI Q&A
2026-01-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
llamastack llama_stack to 0.4.0rc3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-532 The product writes sensitive information to a log file.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in llama-stack before version 0.4.0rc3 involves the initialization logs of the PGVector memory adapter exposing the plaintext password used for database connections. Specifically, the logs included the full configuration with the actual password visible, which could lead to sensitive credential leakage. The issue was fixed by introducing a safe_config mechanism that censors the password in logs, replacing it with a placeholder to prevent accidental exposure of sensitive information. [1]


How can this vulnerability impact me? :

The vulnerability can lead to accidental disclosure of database credentials through initialization logs. If an attacker or unauthorized user gains access to these logs, they could obtain the plaintext password for the PGVector database connection, potentially compromising the database security. This could result in unauthorized access to sensitive data stored in the database or further exploitation of the system. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by inspecting the initialization logs of llama-stack before version 0.4.0rc3 for any plaintext exposure of the PGVector password. Specifically, look for log entries similar to: vector_io::pgvector: Initializing PGVector memory adapter with config: host='...', port=..., db='...', user='...', password='realpassword'. To check logs on a system, you might use commands like `grep 'Initializing PGVector memory adapter' /path/to/llama-stack/logs` or `journalctl -u llama-stack | grep 'pgvector'` to find such log entries containing the password in plaintext. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation is to upgrade llama-stack to version 0.4.0rc3 or later, where the vulnerability is fixed by censoring the PGVector password in initialization logs. If upgrading is not immediately possible, restrict access to log files to prevent unauthorized viewing of sensitive information and consider rotating the exposed PGVector database passwords to reduce risk. The fix involves using a safe_config mechanism that censors passwords in logs, so applying the patch or upgrading is the recommended step. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability involves the exposure of plaintext passwords in initialization logs, which could lead to unauthorized disclosure of sensitive credentials. Such exposure can negatively impact compliance with standards and regulations like GDPR and HIPAA that require protection of sensitive information and credentials. By leaking passwords in logs, the vulnerability increases the risk of unauthorized access and data breaches, potentially violating data protection requirements. The fix introduced a mechanism to censor passwords in logs, thereby reducing the risk of credential leakage and helping maintain compliance. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart