<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sensitive-Data-Exposure — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sensitive-data-exposure/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 16:13:54 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sensitive-data-exposure/feed.xml" rel="self" type="application/rss+xml"/><item><title>Valtimo Sensitive Data Exposure via Excessive HTTP Request/Response Logging (CVE-2026-44516)</title><link>https://feed.craftedsignal.io/briefs/2026-05-valtimo-sensitive-data-exposure/</link><pubDate>Mon, 11 May 2026 16:13:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-valtimo-sensitive-data-exposure/</guid><description>The `LoggingRestClientCustomizer` in Valtimo's `web` module automatically intercepts all outgoing HTTP calls and logs the full request/response body and headers, potentially exposing sensitive information like credentials, personal data, and session tokens via error messages logged at ERROR level (CVE-2026-44516).</description><content:encoded><![CDATA[<p>The <code>LoggingRestClientCustomizer</code> component in Valtimo versions 12.4.0 through 12.32.0 and 13.0.0 through 13.25.0 exhibits a sensitive data exposure vulnerability (CVE-2026-44516). This component, designed to log outgoing HTTP calls made via Spring&rsquo;s <code>RestClient</code>, captures and logs the full request body, response body, and response headers. Critically, when an error response is received, this information is included in the <code>HttpClientErrorException</code> message. This exception is then logged at ERROR level by Spring&rsquo;s default exception handling, overriding any DEBUG log level configurations set by the application. This means that even in production environments where debug logging is disabled, sensitive information can still be exposed to anyone with access to the application logs, logging aggregation tools, or the Valtimo logging module (available to Valtimo admins since version 12.5.0). This vulnerability was resolved in versions 12.33.0 and 13.26.0 by removing the request/response data from the <code>HttpClientErrorException</code> constructor and limiting the full report to DEBUG level logging only.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator configures Valtimo to interact with an external API (e.g., ZGW services) that requires authentication.</li>
<li>The Valtimo application makes an HTTP request to the external API, including sensitive data (e.g., API key, JWT token) in the request body or headers.</li>
<li>The external API returns an error response (e.g., 401 Unauthorized, 500 Internal Server Error).</li>
<li>The <code>LoggingRestClientCustomizer</code> intercepts the error response and constructs an <code>HttpClientErrorException</code> containing the full request and response details, including sensitive data.</li>
<li>Spring&rsquo;s default exception handling logs the <code>HttpClientErrorException</code> message at ERROR level.</li>
<li>An attacker gains access to the application logs (e.g., via compromised server access, unauthorized access to logging aggregation tools, or the Valtimo logging module).</li>
<li>The attacker reviews the logs and extracts the sensitive data (e.g., API key, JWT token, personal data) from the logged <code>HttpClientErrorException</code> message.</li>
<li>The attacker uses the leaked authentication credentials to impersonate the Valtimo application against the external API, gaining unauthorized access to resources or performing actions on behalf of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to the exposure of sensitive information, including authentication credentials (JWT tokens, API keys, OAuth tokens), personal data (BSN, email addresses, case details), and session tokens. This information could be used to compromise external APIs integrated with Valtimo, potentially leading to data breaches, unauthorized access to resources, or impersonation of the Valtimo application. The impact is heightened due to the exposure of this data to administrators through the built-in logging module since Valtimo version 12.5.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Valtimo to version 12.33.0 or 13.26.0 to remediate CVE-2026-44516, where the sensitive data is removed from the <code>HttpClientErrorException</code> constructor.</li>
<li>Until upgrading, restrict access to application logs and the Valtimo logging module as described in the advisory&rsquo;s Mitigation section.</li>
<li>Deploy the Sigma rule &ldquo;Detect Valtimo HttpClientErrorException Logging of Sensitive Data&rdquo; to identify instances where sensitive data is being logged in error messages, alerting on potential exposures.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sensitive-data-exposure</category><category>logging</category><category>valtimo</category></item></channel></rss>