Home

Description

traQ is a messenger application built for Digital Creators Club traP. Prior to version 3.25.0, a vulnerability exists where sensitive information, such as OAuth tokens, are recorded in log files when an error occurs during the execution of an SQL query. An attacker could intentionally trigger an SQL error by methods such as placing a high load on the database. This could allow an attacker who has the authority to view the log files to illicitly acquire the recorded sensitive information. This vulnerability has been patched in version 3.25.0. If upgrading is not possible, a temporary workaround involves reviewing access permissions for SQL error logs and strictly limiting access to prevent unauthorized users from viewing them.

PUBLISHED Reserved 2025-08-20 | Published 2025-08-26 | Updated 2025-08-26 | Assigner GitHub_M




MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-532: Insertion of Sensitive Information into Log File

Product status

< 3.25.0
affected

References

github.com/...h/traQ/security/advisories/GHSA-27r7-3m9x-r533

github.com/traPtitech/traQ/pull/2787

github.com/...ommit/ce5da94f5d5a8348f9ecdc82140b6f53b3721698

cve.org (CVE-2025-57813)

nvd.nist.gov (CVE-2025-57813)

Download JSON