Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13743: CWE-532 Insertion of Sensitive Information into Log File in Docker Docker Desktop

0
Low
VulnerabilityCVE-2025-13743cvecve-2025-13743cwe-532
Published: Tue Dec 09 2025 (12/09/2025, 20:39:52 UTC)
Source: CVE Database V5
Vendor/Project: Docker
Product: Docker Desktop

Description

Docker Desktop diagnostics bundles were found to include expired Hub PATs in log output due to error object serialization. This poses a risk of leaking sensitive information in exported diagnostics, especially when access denied errors occurred.

AI-Powered Analysis

AILast updated: 12/09/2025, 20:50:56 UTC

Technical Analysis

CVE-2025-13743 identifies a vulnerability in Docker Desktop version 4.51.0 related to the improper handling of sensitive information in diagnostic logs. Specifically, expired Docker Hub Personal Access Tokens (PATs) are included in diagnostic bundles due to error object serialization during the creation of diagnostic logs. When an access denied error occurs, the error object serialization process inadvertently captures and logs these expired tokens. Although the tokens are expired and cannot be used for authentication, their inclusion in logs represents a leakage of sensitive information, which could potentially aid attackers in reconnaissance or social engineering attacks. The vulnerability requires local access with limited privileges (AV:L) and some user interaction (UI:P) to export the diagnostics. The CVSS 4.0 base score is 2.4, indicating a low severity primarily due to the limited impact on confidentiality and the requirement for local access and user interaction. There are no known exploits in the wild, and no patches have been published at the time of analysis. The vulnerability falls under CWE-532, which concerns the insertion of sensitive information into log files, a common issue that can lead to unintended data exposure. Organizations using Docker Desktop should be aware of this risk when exporting diagnostic logs, especially in environments where logs might be shared with third parties or stored in less secure locations.

Potential Impact

For European organizations, the primary impact of CVE-2025-13743 is the potential leakage of sensitive authentication tokens through diagnostic logs. While the tokens are expired and cannot be directly used for authentication, their exposure could facilitate indirect attacks such as social engineering or targeted phishing campaigns by revealing internal token management practices or user identifiers. Organizations with strict data protection regulations, such as GDPR, may face compliance risks if sensitive information is inadvertently disclosed. The vulnerability requires local access and user interaction, limiting remote exploitation risks but increasing concerns in environments with multiple users or shared workstations. The impact on system integrity and availability is negligible. However, the confidentiality breach, even if limited, can undermine trust and complicate incident response if diagnostic logs are mishandled. European enterprises heavily reliant on containerization and Docker Desktop for development or production workflows should consider this vulnerability in their security posture, particularly when sharing diagnostic data with external support or third-party vendors.

Mitigation Recommendations

To mitigate CVE-2025-13743, European organizations should implement the following specific measures: 1) Avoid exporting or sharing Docker Desktop diagnostic bundles containing sensitive information unless absolutely necessary and ensure they are transmitted securely and only to trusted recipients. 2) Restrict access to diagnostic logs on local machines by enforcing strict file permissions and access controls to prevent unauthorized users from viewing sensitive data. 3) Educate users about the risks of exporting diagnostic data and establish clear policies governing when and how diagnostics should be shared. 4) Monitor Docker Desktop updates closely and apply patches promptly once available to address this vulnerability. 5) Consider using container security tools that can scan logs for sensitive information before sharing. 6) Implement internal auditing to track diagnostic exports and access to logs. 7) If possible, disable or limit diagnostic data collection features in environments where sensitive information leakage poses a high risk. These targeted actions go beyond generic advice by focusing on operational controls around diagnostic data handling and user awareness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Docker
Date Reserved
2025-11-26T14:07:43.047Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693889e152fe50f9a4851f94

Added to database: 12/9/2025, 8:43:13 PM

Last enriched: 12/9/2025, 8:50:56 PM

Last updated: 12/11/2025, 6:25:53 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats