Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65965: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in anchore grype

0
High
VulnerabilityCVE-2025-65965cvecve-2025-65965cwe-212
Published: Tue Nov 25 2025 (11/25/2025, 19:36:11 UTC)
Source: CVE Database V5
Vendor/Project: anchore
Product: grype

Description

CVE-2025-65965 is a high-severity vulnerability in Anchore Grype, a container image and filesystem vulnerability scanner. Versions 0. 68. 0 through 0. 104. 0 improperly include unsanitized registry credentials in output files when using the --file or --output json=<file> options. This credential disclosure can lead to unauthorized access if output files are exposed. The vulnerability does not require authentication or user interaction and affects confidentiality with high impact. It has been patched in version 0. 104.

AI-Powered Analysis

AILast updated: 12/02/2025, 20:06:20 UTC

Technical Analysis

Anchore Grype is a widely used open-source vulnerability scanner for container images and filesystems. CVE-2025-65965 is a vulnerability classified under CWE-212 (Improper Removal of Sensitive Information Before Storage or Transfer) that affects Grype versions from 0.68.0 up to but not including 0.104.1. The issue arises when users define registry credentials for scanning private container registries and then generate scan reports using the --file or --output json=<file> options. Instead of sanitizing or redacting these sensitive credentials, Grype includes them verbatim in the output JSON files. This results in credential leakage if the output files are stored, shared, or accessed by unauthorized parties. The vulnerability does not require any authentication or user interaction to be exploited, and it can be triggered simply by running Grype with the vulnerable output options. The CVSS 4.0 score is 8.2 (high severity), reflecting the high confidentiality impact and ease of exploitation via local access. The flaw has been addressed in Grype version 0.104.1, which properly sanitizes credentials in output files. Until patching, users can mitigate risk by redirecting standard output to files instead of using the vulnerable output flags, preventing credentials from being embedded in output files. No known exploits have been reported in the wild as of now. This vulnerability is critical for organizations relying on Grype for container security, especially those scanning private registries with sensitive credentials.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of container registry credentials. Leakage of these credentials could allow attackers to access private container images, potentially leading to unauthorized deployment of malicious containers, data exfiltration, or lateral movement within the network. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, could face regulatory and reputational damage if such credentials are exposed. The vulnerability affects the integrity of the container supply chain by undermining trust in vulnerability scanning processes. Additionally, compromised registry credentials could facilitate further attacks on cloud environments or CI/CD pipelines. Since Grype is commonly used in DevOps and security workflows, the scope of affected systems can be broad, impacting multiple teams and environments. The ease of exploitation without authentication increases the urgency for remediation. Overall, the vulnerability could disrupt secure container deployment practices and expose sensitive operational secrets.

Mitigation Recommendations

1. Immediately upgrade Anchore Grype to version 0.104.1 or later, where the vulnerability is patched. 2. Until upgrading, avoid using the --file or --output json=<file> options when running Grype scans with registry credentials; instead, redirect stdout to a file to prevent credentials from being embedded in output files. 3. Audit existing Grype output files generated with vulnerable versions for leaked credentials and rotate any exposed registry credentials promptly. 4. Implement strict access controls and encryption on storage locations containing Grype output files to minimize exposure risk. 5. Integrate secrets management solutions to avoid embedding credentials directly in scanning configurations or environment variables. 6. Review and harden CI/CD pipeline permissions to limit the impact of any leaked credentials. 7. Monitor logs and network traffic for unusual access patterns to container registries that could indicate credential misuse. 8. Educate DevOps and security teams about secure usage of vulnerability scanners and proper handling of sensitive output data.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-18T16:14:56.694Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69260888ffc41f183f790649

Added to database: 11/25/2025, 7:50:32 PM

Last enriched: 12/2/2025, 8:06:20 PM

Last updated: 1/10/2026, 10:14:33 PM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats