CVE-2026-34164 (GCVE-0-2026-34164)
Vulnerability from cvelistv5 – Published: 2026-04-16 21:17 – Updated: 2026-04-16 21:17
VLAI?
Title
Valtimo: Sensitive data exposure through inbox message logging in InboxHandlingService
Summary
Valtimo is an open-source business process automation platform. In versions 13.0.0 through 13.21.0, the InboxHandlingService logs the full content of every incoming inbox message at INFO level. Inbox messages can contain highly sensitive information including personal data (PII), citizen identifiers (BSN), and case details. This data is exposed to anyone with access to application logs or any Valtimo user with the admin role through the Admin UI logging module. This issue has been fixed in version 13.22.0. If developers are unable to upgrade immediately, they can restrict access to application logs and adjust the log level for com.ritense.inbox to WARN or higher in their application configuration as a workaround.
Severity ?
4.9 (Medium)
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| valtimo-platform | valtimo |
Affected:
>= 13.0.0.RELEASE, < 13.22.0.RELEASE
|
{
"containers": {
"cna": {
"affected": [
{
"product": "valtimo",
"vendor": "valtimo-platform",
"versions": [
{
"status": "affected",
"version": "\u003e= 13.0.0.RELEASE, \u003c 13.22.0.RELEASE"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Valtimo is an open-source business process automation platform. In versions 13.0.0 through 13.21.0, the InboxHandlingService logs the full content of every incoming inbox message at INFO level. Inbox messages can contain highly sensitive information including personal data (PII), citizen identifiers (BSN), and case details. This data is exposed to anyone with access to application logs or any Valtimo user with the admin role through the Admin UI logging module. This issue has been fixed in version 13.22.0. If developers are unable to upgrade immediately, they can restrict access to application logs and adjust the log level for com.ritense.inbox to WARN or higher in their application configuration as a workaround."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-532",
"description": "CWE-532: Insertion of Sensitive Information into Log File",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-16T21:17:35.472Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-hfrg-mcvw-8mch",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-hfrg-mcvw-8mch"
},
{
"name": "https://github.com/generiekzaakafhandelcomponent/gzac-issues/issues/653",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/generiekzaakafhandelcomponent/gzac-issues/issues/653"
},
{
"name": "https://github.com/valtimo-platform/valtimo/pull/497",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/valtimo-platform/valtimo/pull/497"
},
{
"name": "https://github.com/valtimo-platform/valtimo/commit/f16a1940ba7b34627c0b966f98ca78655ace9335",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/valtimo-platform/valtimo/commit/f16a1940ba7b34627c0b966f98ca78655ace9335"
},
{
"name": "https://github.com/valtimo-platform/valtimo/releases/tag/13.22.0",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/valtimo-platform/valtimo/releases/tag/13.22.0"
}
],
"source": {
"advisory": "GHSA-hfrg-mcvw-8mch",
"discovery": "UNKNOWN"
},
"title": "Valtimo: Sensitive data exposure through inbox message logging in InboxHandlingService"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-34164",
"datePublished": "2026-04-16T21:17:35.472Z",
"dateReserved": "2026-03-25T20:12:04.197Z",
"dateUpdated": "2026-04-16T21:17:35.472Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-34164\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-04-16T22:16:37.757\",\"lastModified\":\"2026-04-16T22:16:37.757\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Valtimo is an open-source business process automation platform. In versions 13.0.0 through 13.21.0, the InboxHandlingService logs the full content of every incoming inbox message at INFO level. Inbox messages can contain highly sensitive information including personal data (PII), citizen identifiers (BSN), and case details. This data is exposed to anyone with access to application logs or any Valtimo user with the admin role through the Admin UI logging module. This issue has been fixed in version 13.22.0. If developers are unable to upgrade immediately, they can restrict access to application logs and adjust the log level for com.ritense.inbox to WARN or higher in their application configuration as a workaround.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]}],\"references\":[{\"url\":\"https://github.com/generiekzaakafhandelcomponent/gzac-issues/issues/653\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/valtimo-platform/valtimo/commit/f16a1940ba7b34627c0b966f98ca78655ace9335\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/valtimo-platform/valtimo/pull/497\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/valtimo-platform/valtimo/releases/tag/13.22.0\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-hfrg-mcvw-8mch\",\"source\":\"security-advisories@github.com\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…