CVE-2025-54120: CWE-532: Insertion of Sensitive Information into Log File in PCL-Community PCL2-CE
PCL (Plain Craft Launcher) Community Edition is a Minecraft launcher. In PCL CE versions 2.12.0-beta.5 to 2.12.0-beta.9, the login credentials used during the third-party login process are accidentally recorded in the local log file. Although the log file is not automatically uploaded or shared, if the user manually sends the log file, there is a risk of leakage. This is fixed in version 2.12.0-beta.10.
AI Analysis
Technical Summary
CVE-2025-54120 is a critical vulnerability identified in the PCL-Community's PCL2-CE Minecraft launcher versions 2.12.0-beta.5 through 2.12.0-beta.9. The flaw is classified under CWE-532, which pertains to the insertion of sensitive information into log files. Specifically, during the third-party login process, the launcher inadvertently records user login credentials in a local log file. Although these log files are stored locally and are not automatically transmitted or shared by the application, the presence of sensitive authentication data in plaintext within logs poses a significant security risk. If an attacker gains access to the user's device or if the user manually shares the log files (e.g., for troubleshooting), credentials could be exposed, leading to unauthorized account access. The vulnerability does not require prior authentication but does require user interaction in the form of initiating the login process. The CVSS 4.0 base score is 9.3 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation given local access and user interaction. The issue was addressed in version 2.12.0-beta.10, where logging of sensitive credentials was presumably removed or sanitized. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which PCL2-CE is used within their user base or by employees. While the product is a Minecraft launcher primarily targeted at individual users, organizations with gaming communities, educational institutions using Minecraft for learning, or companies with employees who use the launcher on corporate devices could face risks. The leakage of login credentials could lead to unauthorized access to user accounts, potentially exposing personal data or enabling further social engineering attacks. If compromised credentials are reused elsewhere, the risk extends beyond the launcher itself. Additionally, if attackers gain access to corporate endpoints, they could harvest these logs to escalate privileges or move laterally. Although the vulnerability requires local access and user interaction, the critical severity and high confidentiality impact mean that organizations should treat this as a serious risk, especially in environments where endpoint security is less controlled or where users have administrative privileges.
Mitigation Recommendations
Organizations should ensure that all users update PCL2-CE to version 2.12.0-beta.10 or later, where the vulnerability is fixed. Endpoint security policies should restrict access to log files and monitor for unauthorized access or exfiltration attempts. Users should be educated not to share log files containing sensitive information. Implementing application whitelisting and restricting installation of beta or unapproved software can reduce exposure. Additionally, organizations can deploy endpoint detection and response (EDR) solutions to detect anomalous access to log files. Regular audits of local logs for sensitive data can help identify residual risks. For environments where PCL2-CE use is necessary, consider isolating the application within sandboxed environments or virtual machines to limit potential credential exposure. Finally, encourage users to use unique, strong passwords and enable multi-factor authentication on associated accounts to mitigate the impact of credential leakage.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Poland, Italy, Spain
CVE-2025-54120: CWE-532: Insertion of Sensitive Information into Log File in PCL-Community PCL2-CE
Description
PCL (Plain Craft Launcher) Community Edition is a Minecraft launcher. In PCL CE versions 2.12.0-beta.5 to 2.12.0-beta.9, the login credentials used during the third-party login process are accidentally recorded in the local log file. Although the log file is not automatically uploaded or shared, if the user manually sends the log file, there is a risk of leakage. This is fixed in version 2.12.0-beta.10.
AI-Powered Analysis
Technical Analysis
CVE-2025-54120 is a critical vulnerability identified in the PCL-Community's PCL2-CE Minecraft launcher versions 2.12.0-beta.5 through 2.12.0-beta.9. The flaw is classified under CWE-532, which pertains to the insertion of sensitive information into log files. Specifically, during the third-party login process, the launcher inadvertently records user login credentials in a local log file. Although these log files are stored locally and are not automatically transmitted or shared by the application, the presence of sensitive authentication data in plaintext within logs poses a significant security risk. If an attacker gains access to the user's device or if the user manually shares the log files (e.g., for troubleshooting), credentials could be exposed, leading to unauthorized account access. The vulnerability does not require prior authentication but does require user interaction in the form of initiating the login process. The CVSS 4.0 base score is 9.3 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation given local access and user interaction. The issue was addressed in version 2.12.0-beta.10, where logging of sensitive credentials was presumably removed or sanitized. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the extent to which PCL2-CE is used within their user base or by employees. While the product is a Minecraft launcher primarily targeted at individual users, organizations with gaming communities, educational institutions using Minecraft for learning, or companies with employees who use the launcher on corporate devices could face risks. The leakage of login credentials could lead to unauthorized access to user accounts, potentially exposing personal data or enabling further social engineering attacks. If compromised credentials are reused elsewhere, the risk extends beyond the launcher itself. Additionally, if attackers gain access to corporate endpoints, they could harvest these logs to escalate privileges or move laterally. Although the vulnerability requires local access and user interaction, the critical severity and high confidentiality impact mean that organizations should treat this as a serious risk, especially in environments where endpoint security is less controlled or where users have administrative privileges.
Mitigation Recommendations
Organizations should ensure that all users update PCL2-CE to version 2.12.0-beta.10 or later, where the vulnerability is fixed. Endpoint security policies should restrict access to log files and monitor for unauthorized access or exfiltration attempts. Users should be educated not to share log files containing sensitive information. Implementing application whitelisting and restricting installation of beta or unapproved software can reduce exposure. Additionally, organizations can deploy endpoint detection and response (EDR) solutions to detect anomalous access to log files. Regular audits of local logs for sensitive data can help identify residual risks. For environments where PCL2-CE use is necessary, consider isolating the application within sandboxed environments or virtual machines to limit potential credential exposure. Finally, encourage users to use unique, strong passwords and enable multi-factor authentication on associated accounts to mitigate the impact of credential leakage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-16T23:53:40.508Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68803137ad5a09ad0004bf4e
Added to database: 7/23/2025, 12:47:51 AM
Last enriched: 7/30/2025, 1:34:46 AM
Last updated: 9/3/2025, 3:12:13 AM
Views: 37
Related Threats
CVE-2025-38603
LowCVE-2025-58313: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
MediumCVE-2025-58296: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
HighCVE-2025-3698: CWE-749 Exposed Dangerous Method or Function in TECNO com.transsion.carlcare
HighCVE-2025-1298: CWE-290 Authentication Bypass by Spoofing in TECNO com.transsion.carlcare
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.