CVE-2025-54876
Description
The Janssen Project is an open-source identity and access management (IAM) platform. In versions 1.9.0 and below, Janssen stores passwords in plaintext in the local cli_cmd.log file. This is fixed in the nightly prerelease.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2025-54876: The Janssen IAM CLI (jans-cli-tui) stores user passwords and client secrets in plaintext in the local cli_cmd.log file.
Vulnerability
Overview CVE-2025-54876 concerns the Janssen Project, an open-source identity and access management (IAM) platform. In versions 1.9.0 and below, the command‑line interface (jans‑cli‑tui) writes passwords and client secrets as plaintext into a local log file (cli_cmd.log). The root cause is that the logging functions did not redact sensitive fields before writing command arguments to disk [1][2].
Exploitation and
Prerequisites The vulnerability is local in nature; an attacker who gains read access to the log file on the system where the CLI is run can retrieve the stored credentials. No authentication to the Janssen server is required for this access—only file‑system read privileges on the machine hosting the CLI tool [1]. The issue is exposed when administrative commands are executed via the CLI, causing passwords to appear in the log [3].
Impact
Successful exploitation allows a local attacker to obtain plaintext passwords and client secrets. These credentials could then be used to gain unauthorized administrative privileges within the Janssen IAM environment, potentially leading to further compromise of identity and access management operations [1][4].
Mitigation
The Janssen Project has addressed the issue in a nightly prerelease build. The fix, implemented in pull request #11903, modifies the logging routines to mask sensitive fields (userPassword and clientSecret) with asterisks before writing to the log file [3][4]. Users are advised to upgrade to the latest prerelease or apply the patch manually. Administrators should also delete any existing cli_cmd.log files that may contain plaintext credentials [1].
- Jans CLI storing password in plaintext in the local cli_cmd.log file
- Password in plaintext · JanssenProject jans · Discussion #11886
- fix(jans-cli-tui): avoid logging plain texts (#11903) · JanssenProject/jans@3592837
- fix(jans-cli-tui): improve logging by devrimyatar · Pull Request #11903 · JanssenProject/jans
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
21.0.0-a3, 1.0.0-a4, charts-v1.0.0-beta.14, …+ 1 more
- (no CPE)range: 1.0.0-a3, 1.0.0-a4, charts-v1.0.0-beta.14, …
- (no CPE)range: <=1.9.0
Patches
13592837764feVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.