VYPR
Moderate severityNVD Advisory· Published Mar 4, 2026· Updated Mar 4, 2026

Rancher Backup Operator pod's logs leak S3 tokens

CVE-2025-62879

Description

A vulnerability has been identified within the Rancher Backup Operator, resulting in the leakage of S3 tokens (both accessKey and secretKey) into the rancher-backup-operator pod's logs.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Rancher Backup Operator logs S3 accessKey and secretKey, exposing AWS credentials in the pod's logs under default debug levels.

Vulnerability

Overview

The Rancher Backup Operator, used for backing up and restoring Rancher on Kubernetes clusters, contains a vulnerability that causes S3 credentials (accessKey and secretKey) to be written into the operator pod's logs. The S3 accessKey is logged even with default settings (trace: false, debug: false), while the secretKey appears when trace or debug is enabled [3]. This leakage stems from insufficient redaction of sensitive information in log output.

Exploitation

Prerequisites

No special privileges are needed beyond access to the rancher-backup-operator pod logs. An attacker with read access to the cluster logs (e.g., through kubectl logs, log aggregation systems, or compromised monitoring tools) can retrieve the exposed credentials. The attack surface is broadened if logs are exported to external storage [3].

Impact

Successful exploitation allows an attacker to obtain valid S3 accessKey and secretKey tokens. With these credentials, an attacker could access the S3 bucket used for Rancher backups, potentially reading, modifying, or deleting backup data. This could lead to data breach, backup tampering, or disruption of disaster recovery capabilities [1][3].

Mitigation

Patched versions (108.0.1+up9.0.1, 107.1.2+up8.1.2, 106.0.6+up7.0.5, 105.0.6+up6.0.3) apply redaction to prevent credential leakage [3]. Users should upgrade immediately and rotate affected S3 tokens. For environments that cannot upgrade, setting both debug and trace to false reduces exposure, but does not eliminate the accessKey leak [3].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/rancher/backup-restore-operatorGo
>= 9.0.0, < 9.0.19.0.1
github.com/rancher/backup-restore-operatorGo
>= 8.0.0, < 8.1.28.1.2
github.com/rancher/backup-restore-operatorGo
>= 7.0.0, < 7.0.57.0.5
github.com/rancher/backup-restore-operatorGo
>= 6.0.0, < 6.0.36.0.3

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.