Description
When enabling trace logging in Spring Cloud Config Server sensitive information was placed in plain text in the logs.
Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.
Published: 2026-05-07
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

When trace logging is enabled in Spring Cloud Config Server, sensitive information such as secrets, passwords and tokens is written to logs in clear text. This constitutes a data disclosure vulnerability, CWE‑532, that can compromise the confidentiality of any information stored in the logs. The information revealed is limited to what is logged and does not directly alter application behavior or provide execution capabilities.

Affected Systems

Spring Cloud Config 3.1.x versions 3.1.0 through 3.1.13 are affected; upgrade to 3.1.14 or later. Spring Cloud Config 4.1.x 4.1.0 through 4.1.9; upgrade to 4.1.10 or later. Spring Cloud Config 4.2.x 4.2.0 through 4.2.6; upgrade to 4.2.7 or later. Spring Cloud Config 4.3.x 4.3.0 through 4.3.2; upgrade to 4.3.3 or later. Spring Cloud Config 5.0.x 5.0.0 through 5.0.2; upgrade to 5.0.3 or later. Enterprise Support is required for versions 3.1.x and 4.1.x‑4.3.x.

Risk and Exploitability

The CVSS score of 4.4 indicates moderate severity. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Likely exploitation requires an attacker who can read the server logs, either locally or via compromised credentials, triggered by enabling trace logging. No remote execution or denial‑of‑service vectors are documented. The main risk is unauthorized disclosure of sensitive data to any individual or process that has access to the log files.

Generated by OpenCVE AI on May 7, 2026 at 05:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Spring Cloud Config to the fixed versions listed above (3.1.14+, 4.1.10+, 4.2.7+, 4.3.3+, 5.0.3+).
  • Disable trace logging or lower the log level to avoid writing sensitive data to logs.
  • Ensure that log files are protected by file permissions and monitoring to prevent unauthorized read access.

Generated by OpenCVE AI on May 7, 2026 at 05:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Spring
Spring spring Cloud Config
Vendors & Products Spring
Spring spring Cloud Config

Thu, 07 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 05:45:00 +0000

Type Values Removed Values Added
Title Sensitive Information Exposure via Trace Logging in Spring Cloud Config

Thu, 07 May 2026 04:15:00 +0000

Type Values Removed Values Added
Description When enabling trace logging in Spring Cloud Config Server sensitive information was placed in plain text in the logs. Spring Cloud Config 3.1.x: affected from 3.1.0 through 3.1.13 (inclusive); upgrade to 3.1.14 or greater (Enterprise Support Only). Spring Cloud Config 4.1.x: affected from 4.1.0 through 4.1.9 (inclusive); upgrade to 4.1.10 or greater (Enterprise Support Only). Spring Cloud Config 4.2.x: affected from 4.2.0 through 4.2.6 (inclusive); upgrade to 4.2.7 or greater (Enterprise Support Only). Spring Cloud Config 4.3.x: affected from 4.3.0 through 4.3.2 (inclusive); upgrade to 4.3.3 or greater. Spring Cloud Config 5.0.x: affected from 5.0.0 through 5.0.2 (inclusive); upgrade to 5.0.3 or greater.
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Spring Spring Cloud Config
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-05-07T12:56:31.413Z

Reserved: 2026-04-16T02:19:16.426Z

Link: CVE-2026-41004

cve-icon Vulnrichment

Updated: 2026-05-07T12:56:27.652Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T04:16:25.863

Modified: 2026-05-07T14:56:04.523

Link: CVE-2026-41004

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T21:25:09Z

Weaknesses