VYPR
Medium severityNVD Advisory· Published May 22, 2025· Updated Apr 15, 2026

CVE-2025-48374

CVE-2025-48374

Description

zot is ancontainer image/artifact registry based on the Open Container Initiative Distribution Specification. Prior to version 2.1.3 (corresponding to pseudoversion 1.4.4-0.20250522160828-8a99a3ed231f), when using Keycloak as an oidc provider, the clientsecret gets printed into the container stdout logs for an example at container startup. Version 2.1.3 (corresponding to pseudoversion 1.4.4-0.20250522160828-8a99a3ed231f) fixes the issue.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
zotregistry.dev/zotGo
< 1.4.4-0.20250522160828-8a99a3ed231f1.4.4-0.20250522160828-8a99a3ed231f

Patches

1
8a99a3ed231f

Merge commit from fork

https://github.com/project-zot/zotAndrei AaronMay 22, 2025via ghsa
1 file changed · +27 5
  • pkg/api/config/config.go+27 5 modified
    @@ -331,14 +331,36 @@ func (c *Config) Sanitize() *Config {
     		panic(err)
     	}
     
    -	if c.HTTP.Auth != nil && c.HTTP.Auth.LDAP != nil && c.HTTP.Auth.LDAP.bindPassword != "" {
    -		sanitizedConfig.HTTP.Auth.LDAP = &LDAPConfig{}
    +	// Sanitize HTTP config
    +	if c.HTTP.Auth != nil {
    +		// Sanitize LDAP bind password
    +		if c.HTTP.Auth.LDAP != nil && c.HTTP.Auth.LDAP.bindPassword != "" {
    +			sanitizedConfig.HTTP.Auth.LDAP = &LDAPConfig{}
     
    -		if err := DeepCopy(c.HTTP.Auth.LDAP, sanitizedConfig.HTTP.Auth.LDAP); err != nil {
    -			panic(err)
    +			if err := DeepCopy(c.HTTP.Auth.LDAP, sanitizedConfig.HTTP.Auth.LDAP); err != nil {
    +				panic(err)
    +			}
    +
    +			sanitizedConfig.HTTP.Auth.LDAP.bindPassword = "******"
     		}
     
    -		sanitizedConfig.HTTP.Auth.LDAP.bindPassword = "******"
    +		// Sanitize OpenID client secrets
    +		if c.HTTP.Auth.OpenID != nil {
    +			sanitizedConfig.HTTP.Auth.OpenID = &OpenIDConfig{
    +				Providers: make(map[string]OpenIDProviderConfig),
    +			}
    +
    +			for provider, config := range c.HTTP.Auth.OpenID.Providers {
    +				sanitizedConfig.HTTP.Auth.OpenID.Providers[provider] = OpenIDProviderConfig{
    +					Name:         config.Name,
    +					ClientID:     config.ClientID,
    +					ClientSecret: "******",
    +					KeyPath:      config.KeyPath,
    +					Issuer:       config.Issuer,
    +					Scopes:       config.Scopes,
    +				}
    +			}
    +		}
     	}
     
     	if c.IsEventRecorderEnabled() {
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.