Home

Description

Grype is a vulnerability scanner for container images and filesystems. A credential disclosure vulnerability was found in Grype, affecting versions 0.68.0 through 0.104.0. If registry credentials are defined and the output of grype is written using the --file or --output json=<file> option, the registry credentials will be included unsanitized in the output file. This issue has been patched in version 0.104.1. Users running affected versions of grype can work around this vulnerability by redirecting stdout to a file instead of using the --file or --output options.

PUBLISHED Reserved 2025-11-18 | Published 2025-11-25 | Updated 2025-11-25 | Assigner GitHub_M




HIGH: 8.2CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer

Product status

>= 0.68.0, < 0.104.1
affected

References

github.com/.../grype/security/advisories/GHSA-6gxw-85q2-q646

github.com/anchore/grype/pull/3068

github.com/...ommit/39f7fa17af2739cafe9b27176d4a68f7c05f21c1

cve.org (CVE-2025-65965)

nvd.nist.gov (CVE-2025-65965)

Download JSON