CVE-2025-57813 – traP traQ Exposed OAuth Tokens in SQL Error Logs

The following table lists the changes that have been made to the
CVE-2025-57813 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 26, 2025

    Action Type Old Value New Value
    Added Description traQ is a messenger application built for Digital Creators Club traP. Prior to version 3.25.0, a vulnerability exists where sensitive information, such as OAuth tokens, are recorded in log files when an error occurs during the execution of an SQL query. An attacker could intentionally trigger an SQL error by methods such as placing a high load on the database. This could allow an attacker who has the authority to view the log files to illicitly acquire the recorded sensitive information. This vulnerability has been patched in version 3.25.0. If upgrading is not possible, a temporary workaround involves reviewing access permissions for SQL error logs and strictly limiting access to prevent unauthorized users from viewing them.
    Added CVSS V3.1 AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
    Added CWE CWE-532
    Added Reference https://github.com/traPtitech/traQ/commit/ce5da94f5d5a8348f9ecdc82140b6f53b3721698
    Added Reference https://github.com/traPtitech/traQ/pull/2787
    Added Reference https://github.com/traPtitech/traQ/security/advisories/GHSA-27r7-3m9x-r533
Share the Post:

Related Posts