GHSA-vxg3-w9rv-rhr2: Contrast leaks workload secrets to logs on INFO level
7.3
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
8/28/2025
Updated
8/28/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/edgelesssys/contrast | go | >= 1.9.0, <= 1.12.1 | 1.12.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is a classic case of CWE-532, Insertion of Sensitive Information into Log File. The analysis of the provided patches confirms that the run
function in initializer/main.go
was logging a variable resp
that contained sensitive workload secrets. The patch removes this logging statement and replaces it with a generic message, thus mitigating the vulnerability. The function main.run
is the direct source of the information leak and would appear in a runtime profile when the vulnerable code is executed. The vulnerability was a regression, meaning a previous fix was not correctly ported, and the provided commits re-apply the necessary changes to prevent the secret leakage.
Vulnerable functions
main.run
initializer/main.go
The function `run` in `initializer/main.go` was logging the response of a certificate request, which contained sensitive information (workload secrets). This information was logged at the INFO level, making it accessible to anyone with permission to view pod logs.