{"api_version":"1","generated_at":"2026-04-22T22:49:32+00:00","cve":"CVE-2025-31213","urls":{"html":"https://cve.report/CVE-2025-31213","api":"https://cve.report/api/cve/CVE-2025-31213.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-31213","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-31213"},"summary":{"title":"CVE-2025-31213","description":"A logging issue was addressed with improved data redaction. This issue is fixed in iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6. An app may be able to access associated usernames and websites in a user's iCloud Keychain.","state":"PUBLISHED","assigner":"apple","published_at":"2025-05-12 22:15:22","updated_at":"2026-04-02 19:19:48"},"problem_types":["CWE-532","An app may be able to access associated usernames and websites in a user's iCloud Keychain","CWE-532 CWE-532 Insertion of Sensitive Information into Log File"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.6","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.6","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"}}],"references":[{"url":"https://support.apple.com/en-us/122718","name":"https://support.apple.com/en-us/122718","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2025/May/7","name":"http://seclists.org/fulldisclosure/2025/May/7","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2025/May/6","name":"http://seclists.org/fulldisclosure/2025/May/6","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/122717","name":"https://support.apple.com/en-us/122717","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2025/May/9","name":"http://seclists.org/fulldisclosure/2025/May/9","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2025/May/8","name":"http://seclists.org/fulldisclosure/2025/May/8","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/122716","name":"https://support.apple.com/en-us/122716","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/122405","name":"https://support.apple.com/en-us/122405","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-31213","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-31213","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Apple","product":"iPadOS","version":"affected 17.7.7 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 13.7.6 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 14.7.6 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 15.5 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2025","cve_id":"31213","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2025","cve_id":"31213","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L","version":"3.1"}},{"other":{"content":{"id":"CVE-2025-31213","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-05-13T17:43:47.906339Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"CWE-532 Insertion of Sensitive Information into Log File","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-05-13T17:45:13.801Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2025-11-03T19:49:17.928Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"http://seclists.org/fulldisclosure/2025/May/9"},{"url":"http://seclists.org/fulldisclosure/2025/May/8"},{"url":"http://seclists.org/fulldisclosure/2025/May/7"},{"url":"http://seclists.org/fulldisclosure/2025/May/6"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"iPadOS","vendor":"Apple","versions":[{"lessThan":"17.7.7","status":"affected","version":"0","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"13.7.6","status":"affected","version":"0","versionType":"custom"},{"lessThan":"14.7.6","status":"affected","version":"0","versionType":"custom"},{"lessThan":"15.5","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A logging issue was addressed with improved data redaction. This issue is fixed in iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6. An app may be able to access associated usernames and websites in a user's iCloud Keychain."}],"problemTypes":[{"descriptions":[{"description":"An app may be able to access associated usernames and websites in a user's iCloud Keychain","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-02T18:12:50.688Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"url":"https://support.apple.com/en-us/122405"},{"url":"https://support.apple.com/en-us/122716"},{"url":"https://support.apple.com/en-us/122717"},{"url":"https://support.apple.com/en-us/122718"}]}},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2025-31213","datePublished":"2025-05-12T21:42:29.916Z","dateReserved":"2025-03-27T16:13:58.316Z","dateUpdated":"2026-04-02T18:12:50.688Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-05-12 22:15:22","lastModifiedDate":"2026-04-02 19:19:48","problem_types":["CWE-532","An app may be able to access associated usernames and websites in a user's iCloud Keychain","CWE-532 CWE-532 Insertion of Sensitive Information into Log File"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":4.7}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"17.7.7","matchCriteriaId":"683ECAF8-DB29-40DB-963A-B95EA2A2AC01"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"13.7.6","matchCriteriaId":"A90AA958-60F3-474C-B351-0F143B498B3E"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.7.6","matchCriteriaId":"0EE6D3FD-8A49-48CF-80A3-0FFC6BA80B99"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0","versionEndExcluding":"15.5","matchCriteriaId":"C7416C76-07EC-4132-A509-E3F62B002CCA"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"31213","Ordinal":"1","Title":"CVE-2025-31213","CVE":"CVE-2025-31213","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"31213","Ordinal":"1","NoteData":"A logging issue was addressed with improved data redaction. This issue is fixed in iPadOS 17.7.7, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6. An app may be able to access associated usernames and websites in a user's iCloud Keychain.","Type":"Description","Title":"CVE-2025-31213"}]}}}