VYPR
Moderate severityNVD Advisory· Published Mar 23, 2025· Updated Apr 1, 2025

Apache Commons VFS: Failing to find an FTP file can reveal the URI's password in an error message

CVE-2025-30474

Description

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Commons VFS.

The FtpFileObject class can throw an exception when a file is not found, revealing the original URI in its message, which may include a password. The fix is to mask the password in the exception message This issue affects Apache Commons VFS: before 2.10.0.

Users are recommended to upgrade to version 2.10.0, which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Commons VFS before 2.10.0 leaks the original URI, including passwords, in exception messages when FTP file lookups fail, exposing sensitive credentials.

Vulnerability

Overview CVE-2025-30474 is an information exposure vulnerability in Apache Commons VFS, a virtual file system library. The FtpFileObject class, when attempting to locate a file that does not exist, throws an exception whose message contains the original URI supplied by the caller [1][2]. If that URI includes embedded credentials (e.g., ftp://user:password@host/), the password is disclosed in plain text within the exception message.

Attack

Surface Exploitation does not require any special privileges beyond the ability to trigger a file-not-found condition on an FTP file system managed by Commons VFS. An attacker who can cause the library to attempt to access a non-existent file—or any operation that results in a missing file error—will receive an exception containing the unredacted URI. The vulnerability can be triggered locally by any code using the affected library, or remotely if the application exposes error details to users (e.g., through verbose error responses or logs) [2][4].

Impact

A successful information disclosure allows an unauthorized actor to capture FTP credentials (username and password) that were intended to remain secret. These credentials could then be reused to access the same FTP server or other services where the same credentials are employed. The moderate severity rating reflects the fact that the attacker must be in a position to observe exception messages, which may be limited in properly configured production environments.

Mitigation

The issue is fixed in Apache Commons VFS version 2.10.0 [1][3]. Users are strongly advised to upgrade to this release, which masks the password in exception messages by replacing the password portion of the URI with "***". No workarounds are documented; upgrading is the recommended remediation [2][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.commons:commons-vfs2Maven
< 2.10.02.10.0

Affected products

2
  • Range: < 2.10.0
  • Apache Software Foundation/Apache Commons VFSv5
    Range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.