Intel

AIKIDO-2025-10873

@logtape/redaction is vulnerable to Insertion of Sensitive Information into Log File

Insertion of Sensitive Information into Log File Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

35

Low Risk

This Affects:

JS@logtape/redaction
0.0.1 - 1.1.2
Fixed in 1.1.3
1.2.0 - 1.2.1
Fixed in 1.2.2

TL;DR

Affected versions of this package are vulnerable to sensitive information exposure in logs due to incomplete redaction in the redactByField() function. Objects passed via the {*} wildcard retained their original references, causing sensitive fields to appear in log messages even when properties were marked for redaction. The issue is fixed by ensuring redactByField() properly redacts sensitive values both in the wildcard-passed objects and within the message array itself.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

@logtape/redaction is vulnerable to Insertion of Sensitive Information into Log File in versions 0.0.1 - 1.1.2 and 1.2.0 - 1.2.1.

How to fix this

Upgrade the @logtape/redaction library to the patch version.