Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-44516— Valtimo: Sensitive data exposure through HTTP request/response logging in LoggingRestClientCustomizer

CVSS 7.6 · High EPSS 0.03% · P8

Possible ATT&CK Techniques 1AI

T1056 · Input Capture

Affected Version Matrix 4

VendorProductVersion RangeStatus
com.ritense.valtimoweb>= 12.4.0, < 12.33.0affected
>= 13.0.0, < 13.26.0affected
valtimo-platformvaltimo>= 12.4.0, < 12.33.0affected
>= 13.0.0, < 13.26.0affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-44516

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Valtimo: Sensitive data exposure through HTTP request/response logging in LoggingRestClientCustomizer
Source: NVD (National Vulnerability Database)
Vulnerability Description
Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full request body, response body, and response headers. When an error response is received, this information is included in the thrown HttpClientErrorException message, which is logged at ERROR level by Spring's default exception handling — regardless of the application's DEBUG log level setting. This vulnerability is fixed in 12.33.0 and 13.26.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
通过日志文件的信息暴露
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
valtimo-platformvaltimo >= 12.4.0, < 12.33.0 -
com.ritense.valtimoweb >= 12.4.0, < 12.33.0 -

II. Public POCs for CVE-2026-44516

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-44516

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-44516

No comments yet


Leave a comment