VYPR
Medium severityOSV Advisory· Published Aug 6, 2025· Updated Apr 15, 2026

CVE-2025-54876

CVE-2025-54876

Description

The Janssen Project is an open-source identity and access management (IAM) platform. In versions 1.9.0 and below, Janssen stores passwords in plaintext in the local cli_cmd.log file. This is fixed in the nightly prerelease.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2025-54876: The Janssen IAM CLI (jans-cli-tui) stores user passwords and client secrets in plaintext in the local cli_cmd.log file.

Vulnerability

Overview CVE-2025-54876 concerns the Janssen Project, an open-source identity and access management (IAM) platform. In versions 1.9.0 and below, the command‑line interface (jans‑cli‑tui) writes passwords and client secrets as plaintext into a local log file (cli_cmd.log). The root cause is that the logging functions did not redact sensitive fields before writing command arguments to disk [1][2].

Exploitation and

Prerequisites The vulnerability is local in nature; an attacker who gains read access to the log file on the system where the CLI is run can retrieve the stored credentials. No authentication to the Janssen server is required for this access—only file‑system read privileges on the machine hosting the CLI tool [1]. The issue is exposed when administrative commands are executed via the CLI, causing passwords to appear in the log [3].

Impact

Successful exploitation allows a local attacker to obtain plaintext passwords and client secrets. These credentials could then be used to gain unauthorized administrative privileges within the Janssen IAM environment, potentially leading to further compromise of identity and access management operations [1][4].

Mitigation

The Janssen Project has addressed the issue in a nightly prerelease build. The fix, implemented in pull request #11903, modifies the logging routines to mask sensitive fields (userPassword and clientSecret) with asterisks before writing to the log file [3][4]. Users are advised to upgrade to the latest prerelease or apply the patch manually. Administrators should also delete any existing cli_cmd.log files that may contain plaintext credentials [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Janssenproject/JansOSV2 versions
    1.0.0-a3, 1.0.0-a4, charts-v1.0.0-beta.14, …+ 1 more
    • (no CPE)range: 1.0.0-a3, 1.0.0-a4, charts-v1.0.0-beta.14, …
    • (no CPE)range: <=1.9.0

Patches

1

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.