Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16635 | Para Server Logs Sensitive Information |
Github GHSA |
GHSA-v75g-77vf-6jjq | Para Server Logs Sensitive Information |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 02 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Jun 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 exposes both access and secret keys in logs without redaction. These credentials are later reused in variable assignments for persistence but do not require logging for debugging or system health purposes. Version 1.50.8 fixes the issue. | |
| Title | Para Server Logs Sensitive Information | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-02T16:47:02.156Z
Reserved: 2025-05-28T18:49:07.585Z
Link: CVE-2025-48955
Updated: 2025-06-02T16:46:39.998Z
Status : Awaiting Analysis
Published: 2025-06-02T12:15:25.523
Modified: 2025-06-02T17:32:17.397
Link: CVE-2025-48955
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:17Z
EUVD
Github GHSA