{"api_version":"1","generated_at":"2026-05-14T22:04:16+00:00","cve":"CVE-2026-44516","urls":{"html":"https://cve.report/CVE-2026-44516","api":"https://cve.report/api/cve/CVE-2026-44516.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-44516","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-44516"},"summary":{"title":"Valtimo: Sensitive data exposure through HTTP request/response logging in LoggingRestClientCustomizer","description":"Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full request body, response body, and response headers. When an error response is received, this information is included in the thrown HttpClientErrorException message, which is logged at ERROR level by Spring's default exception handling — regardless of the application's DEBUG log level setting. This vulnerability is fixed in 12.33.0 and 13.26.0.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-14 17:16:23","updated_at":"2026-05-14 18:14:47"},"problem_types":["CWE-532","CWE-532 CWE-532: Insertion of Sensitive Information into Log File"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"7.6","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.6","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-3jh5-rr2q-xfv7","name":"https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-3jh5-rr2q-xfv7","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-44516","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-44516","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"valtimo-platform","product":"valtimo","version":"affected >= 12.4.0, < 12.33.0","platforms":[]},{"source":"CNA","vendor":"valtimo-platform","product":"valtimo","version":"affected >= 13.0.0, < 13.26.0","platforms":[]},{"source":"CNA","vendor":"com.ritense.valtimo","product":"web","version":"affected >= 12.4.0, < 12.33.0","platforms":[]},{"source":"CNA","vendor":"com.ritense.valtimo","product":"web","version":"affected >= 13.0.0, < 13.26.0","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"valtimo","vendor":"valtimo-platform","versions":[{"status":"affected","version":">= 12.4.0, < 12.33.0"},{"status":"affected","version":">= 13.0.0, < 13.26.0"}]},{"product":"web","vendor":"com.ritense.valtimo","versions":[{"status":"affected","version":">= 12.4.0, < 12.33.0"},{"status":"affected","version":">= 13.0.0, < 13.26.0"}]}],"descriptions":[{"lang":"en","value":"Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full request body, response body, and response headers. When an error response is received, this information is included in the thrown HttpClientErrorException message, which is logged at ERROR level by Spring's default exception handling — regardless of the application's DEBUG log level setting. This vulnerability is fixed in 12.33.0 and 13.26.0."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"CWE-532: Insertion of Sensitive Information into Log File","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-14T16:48:06.113Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-3jh5-rr2q-xfv7","tags":["x_refsource_CONFIRM"],"url":"https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-3jh5-rr2q-xfv7"}],"source":{"advisory":"GHSA-3jh5-rr2q-xfv7","discovery":"UNKNOWN"},"title":"Valtimo: Sensitive data exposure through HTTP request/response logging in LoggingRestClientCustomizer"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-44516","datePublished":"2026-05-14T16:48:06.113Z","dateReserved":"2026-05-06T18:28:20.887Z","dateUpdated":"2026-05-14T16:48:06.113Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-14 17:16:23","lastModifiedDate":"2026-05-14 18:14:47","problem_types":["CWE-532","CWE-532 CWE-532: Insertion of Sensitive Information into Log File"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.7}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"44516","Ordinal":"1","Title":"Valtimo: Sensitive data exposure through HTTP request/response l","CVE":"CVE-2026-44516","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"44516","Ordinal":"1","NoteData":"Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full request body, response body, and response headers. When an error response is received, this information is included in the thrown HttpClientErrorException message, which is logged at ERROR level by Spring's default exception handling — regardless of the application's DEBUG log level setting. This vulnerability is fixed in 12.33.0 and 13.26.0.","Type":"Description","Title":"Valtimo: Sensitive data exposure through HTTP request/response l"}]}}}