Valtimo: Sensitive data exposure through inbox message logging in InboxHandlingService
Summary
| CVE | CVE-2026-34164 |
|---|---|
| State | PUBLISHED |
| Assigner | GitHub_M |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-16 22:16:37 UTC |
| Updated | 2026-04-16 22:16:37 UTC |
| Description | Valtimo is an open-source business process automation platform. In versions 13.0.0 through 13.21.0, the InboxHandlingService logs the full content of every incoming inbox message at INFO level. Inbox messages can contain highly sensitive information including personal data (PII), citizen identifiers (BSN), and case details. This data is exposed to anyone with access to application logs or any Valtimo user with the admin role through the Admin UI logging module. This issue has been fixed in version 13.22.0. If developers are unable to upgrade immediately, they can restrict access to application logs and adjust the log level for com.ritense.inbox to WARN or higher in their application configuration as a workaround. |
Risk And Classification
Primary CVSS: v3.1 4.9 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Problem Types: CWE-532 | CWE-532 CWE-532: Insertion of Sensitive Information into Log File
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 4.9 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
| 3.1 | CNA | DECLARED | 4.9 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
HighUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Valtimo-platform | Valtimo | affected >= 13.0.0.RELEASE, < 13.22.0.RELEASE | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/valtimo-platform/valtimo/releases/tag/13.22.0 | [email protected] | github.com | |
| github.com/generiekzaakafhandelcomponent/gzac-issues/issues/653 | [email protected] | github.com | |
| github.com/valtimo-platform/valtimo/commit/f16a1940ba7b34627c0b966f98ca7... | [email protected] | github.com | |
| github.com/valtimo-platform/valtimo/pull/497 | [email protected] | github.com | |
| github.com/valtimo-platform/valtimo/security/advisories/GHSA-hfrg-mcvw-8mch | [email protected] | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.