Impact
The vulnerability in Apache APISIX allows the tencent-cloud-cls log export plugin to transmit log data over unencrypted HTTP, exposing sensitive information in cleartext. This flaw permits an attacker to intercept the log traffic and view its contents, potentially revealing confidential data. The weakness maps to data being sent without encryption (CWE‑319) and does not lead to code execution or denial of service.
Affected Systems
Apache APISIX, released by the Apache Software Foundation, is affected in versions 2.99.0 through 3.15.0. Deployments that use the tencent-cloud-cls log export plugin in these versions are vulnerable unless mitigated.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% signals a low probability of exploitation in the near term. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a network eavesdropper able to capture HTTP traffic between an APISIX instance and the Tencent Cloud CLS service, thereby obtaining the unencrypted log data.
OpenCVE Enrichment