CVE-2025-50200

EUVD-2025-18689
RabbitMQ is a messaging and streaming broker. In versions 3.13.7 and prior, RabbitMQ is logging authorization headers in plaintext encoded in base64. When querying RabbitMQ api with HTTP/s with basic authentication it creates logs with all headers in request, including authorization headers which show base64 encoded username:password. This is easy to decode and afterwards could be used to obtain control to the system depending on credentials. This issue has been patched in version 4.0.8.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Affected Products (NVD)
VendorProductVersion
broadcomrabbitmq_server
𝑥
< 4.0.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
rabbitmq-server
bookworm
3.10.8-1.1+deb12u1
not-affected
bookworm (security)
3.10.8-1.1+deb12u1
fixed
bullseye
3.8.9-3+deb11u1
not-affected
bullseye (security)
3.8.9-3+deb11u1
fixed
forky
4.0.5-10
fixed
sid
4.0.5-11
fixed
trixie
4.0.5-6+deb13u2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
rabbitmq-server
bionic
not-affected
focal
not-affected
jammy
not-affected
noble
not-affected
oracular
ignored
plucky
Fixed 4.0.5-2ubuntu2.1
released
xenial
not-affected