{"api_version":"1","generated_at":"2026-04-23T07:56:22+00:00","cve":"CVE-2020-15125","urls":{"html":"https://cve.report/CVE-2020-15125","api":"https://cve.report/api/cve/CVE-2020-15125.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-15125","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-15125"},"summary":{"title":"CVE-2020-15125","description":"In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2020-07-29 17:15:00","updated_at":"2021-04-28 17:08:00"},"problem_types":["CWE-209"],"metrics":[],"references":[{"url":"https://github.com/auth0/node-auth0/pull/507","name":"https://github.com/auth0/node-auth0/pull/507","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"Sanitize Headers on Errors by jimmyjames · Pull Request #507 · auth0/node-auth0 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c","name":"https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"Sanitize Headers on Errors by jimmyjames · Pull Request #507 · auth0/node-auth0 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/auth0/node-auth0/tree/v2.27.1","name":"https://github.com/auth0/node-auth0/tree/v2.27.1","refsource":"MISC","tags":["Release Notes","Third Party Advisory"],"title":"GitHub - auth0/node-auth0 at v2.27.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53","name":"https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Authorization header is not sanitized in an error object · Advisory · auth0/node-auth0 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-15125","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15125","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"15125","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"auth0","cpe5":"auth0","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"15125","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"auth0","cpe5":"auth0","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"15125","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"auth0","cpe5":"auth0.js","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-15125","qid":"983193","title":"Nodejs (npm) Security Update for auth0 (GHSA-5jpf-pj32-xx53)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2020-15125","STATE":"PUBLIC","TITLE":"Authorization header is not sanitized in an error object in auth0"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"node-auth0","version":{"version_data":[{"version_value":"< 2.27.1"}]}}]},"vendor_name":"auth0"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API"}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-209: Generation of Error Message Containing Sensitive Information"}]}]},"references":{"reference_data":[{"name":"https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53","refsource":"CONFIRM","url":"https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53"},{"name":"https://github.com/auth0/node-auth0/pull/507","refsource":"MISC","url":"https://github.com/auth0/node-auth0/pull/507"},{"name":"https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c","refsource":"MISC","url":"https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c"},{"name":"https://github.com/auth0/node-auth0/tree/v2.27.1","refsource":"MISC","url":"https://github.com/auth0/node-auth0/tree/v2.27.1"}]},"source":{"advisory":"GHSA-5jpf-pj32-xx53","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2020-07-29 17:15:00","lastModifiedDate":"2021-04-28 17:08:00","problem_types":["CWE-209"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH"},"exploitabilityScore":3.1,"impactScore":4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:auth0:auth0.js:*:*:*:*:*:*:*:*","versionEndExcluding":"2.27.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"15125","Ordinal":"176504","Title":"CVE-2020-15125","CVE":"CVE-2020-15125","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"15125","Ordinal":"1","NoteData":"In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API","Type":"Description","Title":null},{"CveYear":"2020","CveId":"15125","Ordinal":"2","NoteData":"2020-07-29","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"15125","Ordinal":"3","NoteData":"2020-07-29","Type":"Other","Title":"Modified"}]}}}