{"api_version":"1","generated_at":"2026-04-22T21:28:34+00:00","cve":"CVE-2022-23469","urls":{"html":"https://cve.report/CVE-2022-23469","api":"https://cve.report/api/cve/CVE-2022-23469.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-23469","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-23469"},"summary":{"title":"CVE-2022-23469","description":"Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-12-08 22:15:00","updated_at":"2022-12-12 18:47:00"},"problem_types":["CWE-532"],"metrics":[],"references":[{"url":"https://github.com/traefik/traefik/pull/9574","name":"https://github.com/traefik/traefik/pull/9574","refsource":"MISC","tags":[],"title":"Remove logs of the request by ldez · Pull Request #9574 · traefik/traefik · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/traefik/traefik/releases/tag/v2.9.6","name":"https://github.com/traefik/traefik/releases/tag/v2.9.6","refsource":"MISC","tags":[],"title":"Release v2.9.6 · traefik/traefik · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/traefik/traefik/security/advisories/GHSA-h2ph-vhm7-g4hp","name":"https://github.com/traefik/traefik/security/advisories/GHSA-h2ph-vhm7-g4hp","refsource":"MISC","tags":[],"title":"Authorization header displayed in the debug logs · Advisory · traefik/traefik · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-23469","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23469","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"23469","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"traefik","cpe5":"traefik","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-23469","qid":"503272","title":"Alpine Linux Security Update for traefik"},{"cve":"CVE-2022-23469","qid":"506264","title":"Alpine Linux Security Update for traefik"},{"cve":"CVE-2022-23469","qid":"691004","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for traefik (508da89c-78b9-11ed-854f-5404a68ad561)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-23469","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","cweId":"CWE-200"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"traefik","product":{"product_data":[{"product_name":"traefik","version":{"version_data":[{"version_value":"< 2.9.6","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/traefik/traefik/security/advisories/GHSA-h2ph-vhm7-g4hp","refsource":"MISC","name":"https://github.com/traefik/traefik/security/advisories/GHSA-h2ph-vhm7-g4hp"},{"url":"https://github.com/traefik/traefik/pull/9574","refsource":"MISC","name":"https://github.com/traefik/traefik/pull/9574"},{"url":"https://github.com/traefik/traefik/releases/tag/v2.9.6","refsource":"MISC","name":"https://github.com/traefik/traefik/releases/tag/v2.9.6"}]},"source":{"advisory":"GHSA-h2ph-vhm7-g4hp","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.5,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2022-12-08 22:15:00","lastModifiedDate":"2022-12-12 18:47:00","problem_types":["CWE-532"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*","versionEndExcluding":"2.9.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"23469","Ordinal":"226335","Title":"CVE-2022-23469","CVE":"CVE-2022-23469","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"23469","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}