CVE-2025-3911: CWE-532 Insertion of Sensitive Information into Log File in Docker Docker Desktop
Recording of environment variables, configured for running containers, in Docker Desktop application logs could lead to unintentional disclosure of sensitive information such as api keys, passwords, etc. A malicious actor with read access to these logs could obtain sensitive credentials information and further use it to gain unauthorized access to other systems. Starting with version 4.41.0, Docker Desktop no longer logs environment variables set by the user.
AI Analysis
Technical Summary
CVE-2025-3911 is a vulnerability identified in Docker Desktop, specifically related to the logging of environment variables configured for running containers. The issue stems from the application logging sensitive environment variables such as API keys, passwords, and other credentials in its log files. These logs, if accessed by a malicious actor, could lead to the unintentional disclosure of sensitive information. This vulnerability is categorized under CWE-532, which involves the insertion of sensitive information into log files. The root cause is that Docker Desktop prior to version 4.41.0 recorded environment variables in logs, thereby exposing sensitive data. Starting with version 4.41.0, Docker Desktop has mitigated this issue by no longer logging user-set environment variables. The CVSS 4.0 base score is 5.2 (medium severity), with an attack vector of local access (AV:L), low attack complexity (AC:L), requiring privileges (PR:L) and partial authentication (AT:P), no user interaction (UI:N), and high scope impact (SC:H) with high impact on confidentiality (SI:H) and integrity (SA:H). The vulnerability does not affect availability. Exploitation requires local access to the system where Docker Desktop is installed and some level of privileges, but no user interaction is needed. No known exploits are reported in the wild as of the publication date. The vulnerability primarily risks confidentiality and integrity by exposing sensitive environment variables that could be leveraged to gain unauthorized access to other systems or services integrated with Docker containers.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive credentials and secrets used in containerized environments. Organizations relying on Docker Desktop for development, testing, or production workflows could inadvertently expose API keys, passwords, or tokens through logs accessible to local users or attackers who gain local access. This exposure could lead to lateral movement within networks, unauthorized access to cloud services, or compromise of critical infrastructure. The integrity of container configurations and deployed applications could also be affected if attackers leverage stolen credentials to alter container behavior or inject malicious code. Given the widespread adoption of Docker Desktop among developers and IT teams in Europe, especially in sectors such as finance, healthcare, and critical infrastructure, the risk of data breaches and compliance violations (e.g., GDPR) is elevated. However, the requirement for local access and privileges somewhat limits the attack surface to insider threats or attackers who have already compromised a system.
Mitigation Recommendations
1. Upgrade Docker Desktop to version 4.41.0 or later, where logging of environment variables has been disabled by default. 2. Restrict access to Docker Desktop log files by enforcing strict file system permissions, ensuring only authorized users and administrators can read these logs. 3. Implement robust endpoint security controls to prevent unauthorized local access, including the use of multi-factor authentication and least privilege principles for user accounts. 4. Regularly audit and monitor logs and access patterns to detect any unusual access to Docker Desktop logs or environment configurations. 5. Avoid embedding sensitive credentials directly in environment variables; instead, use secure secret management tools or Docker secrets where possible. 6. Educate developers and operations teams about the risks of logging sensitive information and encourage secure coding and deployment practices. 7. For organizations using shared or multi-user workstations, consider isolating Docker Desktop environments or using container orchestration platforms with enhanced security controls that do not log sensitive data.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2025-3911: CWE-532 Insertion of Sensitive Information into Log File in Docker Docker Desktop
Description
Recording of environment variables, configured for running containers, in Docker Desktop application logs could lead to unintentional disclosure of sensitive information such as api keys, passwords, etc. A malicious actor with read access to these logs could obtain sensitive credentials information and further use it to gain unauthorized access to other systems. Starting with version 4.41.0, Docker Desktop no longer logs environment variables set by the user.
AI-Powered Analysis
Technical Analysis
CVE-2025-3911 is a vulnerability identified in Docker Desktop, specifically related to the logging of environment variables configured for running containers. The issue stems from the application logging sensitive environment variables such as API keys, passwords, and other credentials in its log files. These logs, if accessed by a malicious actor, could lead to the unintentional disclosure of sensitive information. This vulnerability is categorized under CWE-532, which involves the insertion of sensitive information into log files. The root cause is that Docker Desktop prior to version 4.41.0 recorded environment variables in logs, thereby exposing sensitive data. Starting with version 4.41.0, Docker Desktop has mitigated this issue by no longer logging user-set environment variables. The CVSS 4.0 base score is 5.2 (medium severity), with an attack vector of local access (AV:L), low attack complexity (AC:L), requiring privileges (PR:L) and partial authentication (AT:P), no user interaction (UI:N), and high scope impact (SC:H) with high impact on confidentiality (SI:H) and integrity (SA:H). The vulnerability does not affect availability. Exploitation requires local access to the system where Docker Desktop is installed and some level of privileges, but no user interaction is needed. No known exploits are reported in the wild as of the publication date. The vulnerability primarily risks confidentiality and integrity by exposing sensitive environment variables that could be leveraged to gain unauthorized access to other systems or services integrated with Docker containers.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive credentials and secrets used in containerized environments. Organizations relying on Docker Desktop for development, testing, or production workflows could inadvertently expose API keys, passwords, or tokens through logs accessible to local users or attackers who gain local access. This exposure could lead to lateral movement within networks, unauthorized access to cloud services, or compromise of critical infrastructure. The integrity of container configurations and deployed applications could also be affected if attackers leverage stolen credentials to alter container behavior or inject malicious code. Given the widespread adoption of Docker Desktop among developers and IT teams in Europe, especially in sectors such as finance, healthcare, and critical infrastructure, the risk of data breaches and compliance violations (e.g., GDPR) is elevated. However, the requirement for local access and privileges somewhat limits the attack surface to insider threats or attackers who have already compromised a system.
Mitigation Recommendations
1. Upgrade Docker Desktop to version 4.41.0 or later, where logging of environment variables has been disabled by default. 2. Restrict access to Docker Desktop log files by enforcing strict file system permissions, ensuring only authorized users and administrators can read these logs. 3. Implement robust endpoint security controls to prevent unauthorized local access, including the use of multi-factor authentication and least privilege principles for user accounts. 4. Regularly audit and monitor logs and access patterns to detect any unusual access to Docker Desktop logs or environment configurations. 5. Avoid embedding sensitive credentials directly in environment variables; instead, use secure secret management tools or Docker secrets where possible. 6. Educate developers and operations teams about the risks of logging sensitive information and encourage secure coding and deployment practices. 7. For organizations using shared or multi-user workstations, consider isolating Docker Desktop environments or using container orchestration platforms with enhanced security controls that do not log sensitive data.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Docker
- Date Reserved
- 2025-04-23T20:43:14.232Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbee954
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/25/2025, 2:19:32 AM
Last updated: 8/18/2025, 10:42:24 AM
Views: 65
Related Threats
CVE-2025-33100: CWE-798 Use of Hard-coded Credentials in IBM Concert Software
MediumCVE-2025-33090: CWE-1333 Inefficient Regular Expression Complexity in IBM Concert Software
HighCVE-2025-27909: CWE-942 Permissive Cross-domain Policy with Untrusted Domains in IBM Concert Software
MediumCVE-2025-1759: CWE-244 Improper Clearing of Heap Memory Before Release ('Heap Inspection') in IBM Concert Software
MediumCVE-2025-4962: CWE-284 Improper Access Control in lunary-ai lunary-ai/lunary
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.