VYPR
Medium severity5.5NVD Advisory· Published Dec 4, 2025· Updated May 6, 2026

CVE-2025-14010

CVE-2025-14010

Description

A flaw was found in ansible-collection-community-general. This vulnerability allows for information exposure (IE) of sensitive credentials, specifically plaintext passwords, via verbose output when running Ansible with debug modes. Attackers with access to logs could retrieve these secrets and potentially compromise Keycloak accounts or administrative access.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ansiblePyPI
< 12.2.012.2.0

Affected products

8
  • cpe:2.3:a:redhat:community.general:-:*:*:*:*:*:*:*
  • Red Hat/Red Hat Ceph Storage 5v5
    cpe:/a:redhat:ceph_storage:5
  • Red Hat/Red Hat Ceph Storage 6v5
    cpe:/a:redhat:ceph_storage:6
  • Red Hat/Red Hat Ceph Storage 7v5
    cpe:/a:redhat:ceph_storage:7
  • Red Hat/Red Hat Ceph Storage 8v5
    cpe:/a:redhat:ceph_storage:8
  • Red Hat/Red Hat OpenStack Platform 17.1v5
    cpe:/a:redhat:openstack:17.1
  • Red Hat/Red Hat OpenStack Platform 18.0v5
    cpe:/a:redhat:openstack:18.0
  • ansible-collections/Ansible Community General Collectionv5
    Range: 7.1.0

Patches

1
08e56bbb9b57

Mark credentials[].value as no_log=True.

2 files changed · +5 1
  • changelogs/fragments/11005-keycloak_user.yml+4 0 added
    @@ -0,0 +1,4 @@
    +security_fixes:
    +  - "keycloak_user - the parameter ``credentials[].value`` is now marked as ``no_log=true``. Before it was logged by Ansible, unless the task was marked as ``no_log: true``.
    +     Since this parameter can be used for passwords, this resulted in credential leaking
    +     (https://github.com/ansible-collections/community.general/issues/11000, https://github.com/ansible-collections/community.general/pull/11005)."
    
  • plugins/modules/keycloak_user.py+1 1 modified
    @@ -355,7 +355,7 @@ def main():
         argument_spec['auth_username']['aliases'] = []
         credential_spec = dict(
             type=dict(type='str', required=True),
    -        value=dict(type='str', required=True),
    +        value=dict(type='str', required=True, no_log=True),
             temporary=dict(type='bool', default=False)
         )
         client_consents_spec = dict(
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.