kayx23 commented on code in PR #1971:
URL: https://github.com/apache/apisix-website/pull/1971#discussion_r2480463842


##########
blog/en/blog/2025/10/31/cve-2025-62232.md:
##########
@@ -0,0 +1,35 @@
+---
+title: "Insertion of Sensitive Information into Log File (CVE-2025-62232)"
+keywords:
+- Vulnerability
+description: Sensitive data exposure via logging in basic-auth leads to 
plaintext usernames and passwords written to error logs and forwarded to log 
sinks when log level is INFO/DEBUG. This creates a high risk of credential 
compromise through log access.
+tags: [Vulnerabilities]
+image: https://static.api7.ai/uploads/2025/10/31/Y5eZJgtV_CVE-2025-62232.png
+---
+
+> For APISIX versions 1.0 and later, logging in basic-auth leads to plaintext 
usernames and passwords written to error logs.
+<!--truncate-->
+
+## Problem Description
+
+Sensitive data exposure via logging in `basic-auth` leads to plaintext 
usernames and passwords written to error logs and forwarded to log sinks when 
log level is INFO/DEBUG. This creates a high risk of credential compromise 
through log access.
+
+## Affected Versions
+
+This issue affects Apache APISIX versions: 1.0 onwards all versions upto 3.14.
+
+## Solution
+
+Users are recommended to upgrade to version 3.14, which fixes this issue.
+
+## Vulnerability details
+
+Severity: Moderate
+
+Vulnerability public date: October 30, 2025
+
+CVE details: https://nvd.nist.gov/vuln/detail/CVE-2025-62232

Review Comment:
   <img width="1158" height="207" alt="Image" 
src="https://github.com/user-attachments/assets/86031f82-df30-47e4-a935-d69456d2705e";
 />



##########
blog/en/blog/2025/10/31/cve-2025-62232.md:
##########
@@ -0,0 +1,35 @@
+---
+title: "Insertion of Sensitive Information into Log File (CVE-2025-62232)"
+keywords:
+- Vulnerability
+description: Sensitive data exposure via logging in basic-auth leads to 
plaintext usernames and passwords written to error logs and forwarded to log 
sinks when log level is INFO/DEBUG. This creates a high risk of credential 
compromise through log access.
+tags: [Vulnerabilities]
+image: https://static.api7.ai/uploads/2025/10/31/Y5eZJgtV_CVE-2025-62232.png
+---
+
+> For APISIX versions 1.0 and later, logging in basic-auth leads to plaintext 
usernames and passwords written to error logs.
+<!--truncate-->
+
+## Problem Description
+
+Sensitive data exposure via logging in `basic-auth` leads to plaintext 
usernames and passwords written to error logs and forwarded to log sinks when 
log level is INFO/DEBUG. This creates a high risk of credential compromise 
through log access.
+
+## Affected Versions
+
+This issue affects Apache APISIX versions: 1.0 onwards all versions upto 3.14.

Review Comment:
   ```suggestion
   This issue affects all Apache APISIX versions starting from 1.0 through 3.14.
   ```



##########
blog/en/blog/2025/10/31/cve-2025-62232.md:
##########
@@ -0,0 +1,35 @@
+---
+title: "Insertion of Sensitive Information into Log File (CVE-2025-62232)"
+keywords:
+- Vulnerability
+description: Sensitive data exposure via logging in basic-auth leads to 
plaintext usernames and passwords written to error logs and forwarded to log 
sinks when log level is INFO/DEBUG. This creates a high risk of credential 
compromise through log access.
+tags: [Vulnerabilities]
+image: https://static.api7.ai/uploads/2025/10/31/Y5eZJgtV_CVE-2025-62232.png
+---
+
+> For APISIX versions 1.0 and later, logging in basic-auth leads to plaintext 
usernames and passwords written to error logs.
+<!--truncate-->
+
+## Problem Description
+
+Sensitive data exposure via logging in `basic-auth` leads to plaintext 
usernames and passwords written to error logs and forwarded to log sinks when 
log level is INFO/DEBUG. This creates a high risk of credential compromise 
through log access.
+
+## Affected Versions
+
+This issue affects Apache APISIX versions: 1.0 onwards all versions upto 3.14.
+
+## Solution
+
+Users are recommended to upgrade to version 3.14, which fixes this issue.
+
+## Vulnerability details
+
+Severity: Moderate
+
+Vulnerability public date: October 30, 2025

Review Comment:
   ```suggestion
   Vulnerability publication date: October 30, 2025
   ```



##########
blog/en/blog/2025/10/31/cve-2025-62232.md:
##########
@@ -0,0 +1,35 @@
+---
+title: "Insertion of Sensitive Information into Log File (CVE-2025-62232)"
+keywords:
+- Vulnerability
+description: Sensitive data exposure via logging in basic-auth leads to 
plaintext usernames and passwords written to error logs and forwarded to log 
sinks when log level is INFO/DEBUG. This creates a high risk of credential 
compromise through log access.
+tags: [Vulnerabilities]
+image: https://static.api7.ai/uploads/2025/10/31/Y5eZJgtV_CVE-2025-62232.png
+---
+
+> For APISIX versions 1.0 and later, logging in basic-auth leads to plaintext 
usernames and passwords written to error logs.
+<!--truncate-->
+
+## Problem Description
+
+Sensitive data exposure via logging in `basic-auth` leads to plaintext 
usernames and passwords written to error logs and forwarded to log sinks when 
log level is INFO/DEBUG. This creates a high risk of credential compromise 
through log access.

Review Comment:
   ```suggestion
   Sensitive data exposure in `basic-auth` causes plaintext usernames and 
passwords to be written to error logs and forwarded to log sinks when the log 
level is set to INFO/DEBUG. This poses a high risk of credential compromise 
through log access.
   ```



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to