CVE-2025-50200

RabbitMQ is a messaging and streaming broker. In versions 3.13.7 and prior, RabbitMQ is logging authorization headers in plaintext encoded in base64. When querying RabbitMQ api with HTTP/s with basic authentication it creates logs with all headers in request, including authorization headers which show base64 encoded username:password. This is easy to decode and afterwards could be used to obtain control to the system depending on credentials. This issue has been patched in version 4.0.8.
Configurations

Configuration 1 (hide)

cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:*

History

06 Aug 2025, 18:28

Type Values Removed Values Added
CPE cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:*
References () https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-gh3x-4x42-fvq8 - () https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-gh3x-4x42-fvq8 - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Broadcom rabbitmq Server
Broadcom

19 Jun 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-19 17:15

Updated : 2025-08-06 18:28


NVD link : CVE-2025-50200

Mitre link : CVE-2025-50200


JSON object : View

Products Affected

broadcom

  • rabbitmq_server
CWE
CWE-532

Insertion of Sensitive Information into Log File