Apache Commons VFS: Failing to find an FTP file can reveal the URI's password in an error message
Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Commons VFS.
The FtpFileObject class can throw an exception when a file is not found, revealing the original URI in its message, which may include a password. The fix is to mask the password in the exception message This issue affects Apache Commons VFS: before 2.10.0.
Users are recommended to upgrade to version 2.10.0, which fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Commons VFS before 2.10.0 leaks the original URI, including passwords, in exception messages when FTP file lookups fail, exposing sensitive credentials.
Vulnerability
Overview CVE-2025-30474 is an information exposure vulnerability in Apache Commons VFS, a virtual file system library. The FtpFileObject class, when attempting to locate a file that does not exist, throws an exception whose message contains the original URI supplied by the caller [1][2]. If that URI includes embedded credentials (e.g., ftp://user:password@host/), the password is disclosed in plain text within the exception message.
Attack
Surface Exploitation does not require any special privileges beyond the ability to trigger a file-not-found condition on an FTP file system managed by Commons VFS. An attacker who can cause the library to attempt to access a non-existent file—or any operation that results in a missing file error—will receive an exception containing the unredacted URI. The vulnerability can be triggered locally by any code using the affected library, or remotely if the application exposes error details to users (e.g., through verbose error responses or logs) [2][4].
Impact
A successful information disclosure allows an unauthorized actor to capture FTP credentials (username and password) that were intended to remain secret. These credentials could then be reused to access the same FTP server or other services where the same credentials are employed. The moderate severity rating reflects the fact that the attacker must be in a position to observe exception messages, which may be limited in properly configured production environments.
Mitigation
The issue is fixed in Apache Commons VFS version 2.10.0 [1][3]. Users are strongly advised to upgrade to this release, which masks the password in exception messages by replacing the password portion of the URI with "***". No workarounds are documented; upgrading is the recommended remediation [2][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.commons:commons-vfs2Maven | < 2.10.0 | 2.10.0 |
Affected products
2- Range: < 2.10.0
- Apache Software Foundation/Apache Commons VFSv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-3936-3gx6-49c4ghsaADVISORY
- lists.apache.org/thread/w6ztgnbk6ccry3470x191g3xwrpgy6f4ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-30474ghsaADVISORY
- www.openwall.com/lists/oss-security/2025/03/23/2ghsaWEB
- issues.apache.org/jira/browse/VFS-169ghsarelatedWEB
News mentions
0No linked articles in our index yet.