CVE-2025-30205 – Kanidim-Provision Admin Credential Leakage Vulnerability

The following table lists the changes that have been made to the
CVE-2025-30205 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Mar. 24, 2025

    Action Type Old Value New Value
    Added Description kanidim-provision is a helper utility that uses kanidm’s API to provision users, groups and oauth2 systems. Prior to version 1.2.0, a faulty function intrumentation in the (optional) kanidm patches provided by kandim-provision will cause the provisioned admin credentials to be leaked to the system log. This only impacts users which both use the provided patches and provision their `admin` or `idm_admin` account credentials this way. No other credentials are affected. Users should recompile kanidm with the newest patchset from tag `v1.2.0` or higher. As a workaround, the user can set the log level `KANIDM_LOG_LEVEL` to any level higher than `info`, for example `warn`.
    Added CVSS V3.1 AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N
    Added CWE CWE-532
    Added Reference https://github.com/oddlama/kanidm-provision/commit/a102b52e4a79be4263068577ba837f16c3e487a2
    Added Reference https://github.com/oddlama/kanidm-provision/security/advisories/GHSA-57fc-pcqm-53rp
Share the Post:

Related Posts