We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32016

Microsoft Identity Web Exposes Client Secrets and Certificate Information in Service Logs



Description

Microsoft Identity Web is a library which contains a set of reusable classes used in conjunction with ASP.NET Core for integrating with the Microsoft identity platform (formerly Azure AD v2.0 endpoint) and AAD B2C. This vulnerability affects confidential client applications, including daemons, web apps, and web APIs. Under specific circumstances, sensitive information such as client secrets or certificate details may be exposed in the service logs of these applications. Service logs are intended to be handled securely. Service logs generated at the information level or credential descriptions containing local file paths with passwords, Base64 encoded values, or Client secret. Additionally, logs of services using Base64 encoded certificates or certificate paths with password credential descriptions are also affected if the certificates are invalid or expired, regardless of the log level. Note that these credentials are not usable due to their invalid or expired status. To mitigate this vulnerability, update to Microsoft.Identity.Web 3.8.2 or Microsoft.Identity.Abstractions 9.0.0.

Reserved 2025-04-01 | Published 2025-04-09 | Updated 2025-04-09 | Assigner GitHub_M


MEDIUM: 4.7CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-532: Insertion of Sensitive Information into Log File

Product status

>= 3.2.0, < 3.8.2
affected

References

github.com/...ty-web/security/advisories/GHSA-rpq8-q44m-2rpg

cve.org (CVE-2025-32016)

nvd.nist.gov (CVE-2025-32016)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32016

Support options

Helpdesk Chat, Email, Knowledgebase