Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65965: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in anchore grype

0
High
VulnerabilityCVE-2025-65965cvecve-2025-65965cwe-212
Published: Tue Nov 25 2025 (11/25/2025, 19:36:11 UTC)
Source: CVE Database V5
Vendor/Project: anchore
Product: grype

Description

Grype is a vulnerability scanner for container images and filesystems. A credential disclosure vulnerability was found in Grype, affecting versions 0.68.0 through 0.104.0. If registry credentials are defined and the output of grype is written using the --file or --output json=<file> option, the registry credentials will be included unsanitized in the output file. This issue has been patched in version 0.104.1. Users running affected versions of grype can work around this vulnerability by redirecting stdout to a file instead of using the --file or --output options.

AI-Powered Analysis

AILast updated: 11/25/2025, 20:05:33 UTC

Technical Analysis

Anchore Grype is a widely used open-source vulnerability scanner for container images and filesystems, integral to many DevOps and container security pipelines. CVE-2025-65965 is a vulnerability classified under CWE-212 (Improper Removal of Sensitive Information Before Storage or Transfer) affecting Grype versions from 0.68.0 up to but not including 0.104.1. The flaw occurs when registry credentials, if configured, are embedded unsanitized in output files generated by the --file or --output json=<file> options. This means that sensitive authentication tokens or passwords used to access container registries can be inadvertently exposed in scan result files. The vulnerability does not require any authentication or user interaction to exploit, but the attack vector is local (AV:L), meaning an attacker or user with local access to the system running Grype can trigger the leakage. The impact on confidentiality is high since registry credentials can allow unauthorized access to container images, potentially leading to further compromise or data theft. Integrity and availability impacts are not present. The issue has been fixed in version 0.104.1, where output sanitization was improved to remove sensitive data before writing to files. Until patching, users can mitigate risk by redirecting standard output (stdout) to a file instead of using the vulnerable output options, which do not sanitize credentials. No known exploits are currently reported in the wild. The vulnerability was published on November 25, 2025, and carries a CVSS 4.0 score of 8.2, indicating high severity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of container registry credentials, which are critical for secure container image management and deployment. Exposure of these credentials can lead to unauthorized access to private container registries, enabling attackers to download, modify, or replace container images. This can result in supply chain compromises, insertion of malicious code, or disruption of containerized applications. Organizations relying heavily on containerized environments and automated CI/CD pipelines that integrate Grype for vulnerability scanning are particularly at risk. The breach of registry credentials can also undermine compliance with data protection regulations such as GDPR if it leads to broader system compromise or data leakage. The vulnerability’s local attack vector means that insider threats or compromised developer workstations could exploit this flaw. Given the widespread adoption of container technologies in European financial, manufacturing, and technology sectors, the impact could be substantial if not addressed promptly.

Mitigation Recommendations

1. Upgrade Grype to version 0.104.1 or later immediately to apply the official patch that sanitizes sensitive credentials in output files. 2. Until patching is possible, avoid using the --file or --output json=<file> options; instead, redirect standard output (stdout) to a file, which does not include unsanitized credentials. 3. Review and rotate any registry credentials that may have been exposed via output files generated by vulnerable Grype versions. 4. Implement strict access controls and monitoring on systems running Grype to limit local access and detect unauthorized file access or credential leakage. 5. Integrate secrets management solutions to minimize the use of static registry credentials and enable short-lived tokens where possible. 6. Audit CI/CD pipelines and container security workflows to ensure no sensitive information is logged or stored insecurely. 7. Educate development and security teams about secure handling of credentials and the risks of improper output file management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-18T16:14:56.694Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69260888ffc41f183f790649

Added to database: 11/25/2025, 7:50:32 PM

Last enriched: 11/25/2025, 8:05:33 PM

Last updated: 11/25/2025, 9:09:56 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats