CVE-2025-50200
EUVD-2025-1868919.06.2025, 17:15
RabbitMQ is a messaging and streaming broker. In versions 3.13.7 and prior, RabbitMQ is logging authorization headers in plaintext encoded in base64. When querying RabbitMQ api with HTTP/s with basic authentication it creates logs with all headers in request, including authorization headers which show base64 encoded username:password. This is easy to decode and afterwards could be used to obtain control to the system depending on credentials. This issue has been patched in version 4.0.8.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| broadcom | rabbitmq_server | 𝑥 < 4.0.8 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
openSUSE / SLES Releases
openSUSE Product | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| erlang-rabbitmq-client |
| ||||||||||
| erlang-rabbitmq-client313 |
| ||||||||||
| rabbitmq-server |
| ||||||||||
| rabbitmq-server-plugins |
| ||||||||||
| rabbitmq-server313 |
| ||||||||||
| rabbitmq-server313-bash-completion |
| ||||||||||
| rabbitmq-server313-plugins |
| ||||||||||
| rabbitmq-server313-zsh-completion |
|
Common Weakness Enumeration