Miggo Logo

CVE-2025-2598: AWS CDK CLI prints AWS credentials retrieved by custom credential plugins

5.5

CVSS Score
3.1

Basic Information

EPSS Score
0.04022%
Published
3/21/2025
Updated
3/21/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
aws-cdknpm
cdknpm

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from how the CDK CLI processes temporary credentials from plugins. The presence of an 'expiration' property triggers credential refresh logic that appears to serialize/print credential objects. The core functions in the plugin framework that handle credential resolution (loadPlugin and getCredentialProvider) would be responsible for: 1) Interpreting plugin output, 2) Handling expiration-based refresh logic, and 3) Passing credentials to downstream components. Without proper output sanitization in these functions, temporary credentials get logged. The high confidence comes from the vulnerability's direct relationship to plugin credential processing flow described in advisory documentation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Summ*ry T** *WS *lou* **v*lopm*nt Kit (*WS **K) [*] is *n op*n-sour** so*tw*r* **v*lopm*nt *r*m*work *or ***inin* *lou* in*r*stru*tur* in *o** *n* provisionin* it t*rou** *WS *lou**orm*tion. T** *WS **K *LI [*] is * *omm*n* lin* tool *or int*r**t

Reasoning

T** vuln*r**ility st*ms *rom *ow t** **K *LI pro**ss*s t*mpor*ry *r***nti*ls *rom plu*ins. T** pr*s*n** o* *n '*xpir*tion' prop*rty tri***rs *r***nti*l r**r*s* lo*i* t**t *pp**rs to s*ri*liz*/print *r***nti*l o*j**ts. T** *or* *un*tions in t** plu*in