Description
Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full request body, response body, and response headers. When an error response is received, this information is included in the thrown HttpClientErrorException message, which is logged at ERROR level by Spring's default exception handling — regardless of the application's DEBUG log level setting. This vulnerability is fixed in 12.33.0 and 13.26.0.
Published: 2026-05-14
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The LoggingRestClientCustomizer in Valtimo's web module automatically logs the full request body, response body, and response headers for all outgoing HTTP calls made through Spring's RestClient. When an error response is received, this information is included in the exception message and logged at ERROR level by Spring’s default exception handling. Because the logged data contains sensitive request and response payloads, an attacker who can read the application logs may obtain confidential information. The weakness is a classic case of logging sensitive data, identified by CWE‑532. This vulnerability does not provide a direct path for code execution or privilege escalation but can lead to confidentiality breaches if log access is not constrained.

Affected Systems

Valtimo platforms in the web module (com.ritense.valtimo:web) and the core platform (valtimo-platform:valtimo) are affected. Vulnerable versions are 12.4.0 through 12.32.x and 13.25.x. The issue is fixed in 12.33.0 and 13.26.0; versions 12.33.0 and 13.26.0 are not vulnerable.

Risk and Exploitability

With a CVSS score of 7.6, the vulnerability is considered high severity. The EPSS score is not available, so the likelihood of exploitation is uncertain but cannot be ruled out. It is not listed in the CISA KEV catalog, so no known public exploits have been reported. Attackers would need access to the application logs, either directly or via a compromised system, to read the sensitive data. The vulnerability is exploitable as is, without additional preconditions beyond log access.

Generated by OpenCVE AI on May 14, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's patch to upgrade Valtimo to version 12.33.0 or 13.26.0, which removes the automatic logging of request and response bodies.
  • Disable or limit error-level logging that includes exception messages to prevent sensitive data from being written to logs.
  • Restrict access to application logs by ensuring they are stored in a secure location with appropriate permissions, monitor for unusual access, and set log retention policies.

Generated by OpenCVE AI on May 14, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3jh5-rr2q-xfv7 Valtimo has sensitive data exposure through HTTP request/response logging in LoggingRestClientCustomizer
History

Fri, 15 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 17:00:00 +0000

Type Values Removed Values Added
Description Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full request body, response body, and response headers. When an error response is received, this information is included in the thrown HttpClientErrorException message, which is logged at ERROR level by Spring's default exception handling — regardless of the application's DEBUG log level setting. This vulnerability is fixed in 12.33.0 and 13.26.0.
Title Valtimo: Sensitive data exposure through HTTP request/response logging in LoggingRestClientCustomizer
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T15:11:04.946Z

Reserved: 2026-05-06T18:28:20.887Z

Link: CVE-2026-44516

cve-icon Vulnrichment

Updated: 2026-05-15T15:10:23.811Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T17:16:23.363

Modified: 2026-05-14T18:14:47.290

Link: CVE-2026-44516

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T19:00:13Z

Weaknesses