Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68131: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in agronholm cbor2

0
Medium
VulnerabilityCVE-2025-68131cvecve-2025-68131cwe-212
Published: Wed Dec 31 2025 (12/31/2025, 01:15:36 UTC)
Source: CVE Database V5
Vendor/Project: agronholm
Product: cbor2

Description

CVE-2025-68131 is a medium severity vulnerability in the agronholm cbor2 library versions 3. 0. 0 up to but not including 5. 8. 0. The flaw arises when a CBORDecoder instance is reused across multiple decode operations, causing values tagged as shareable (tag 28) to persist in memory. This persistence allows attacker-controlled messages using the sharedref tag (29) to access data from previously decoded messages, leading to potential unauthorized data disclosure across trust boundaries. No authentication or user interaction is required, and exploitation is possible remotely over the network. The vulnerability has a CVSS 4. 0 base score of 5.

AI-Powered Analysis

AILast updated: 12/31/2025, 02:13:57 UTC

Technical Analysis

The vulnerability CVE-2025-68131 affects the agronholm cbor2 Python library, which implements encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Specifically, from version 3.0.0 through versions prior to 5.8.0, the CBORDecoder class exhibits improper handling of shareable data tags. When a CBORDecoder instance is reused for multiple decode operations, values marked with the shareable tag (28) remain in memory and are not properly cleared before subsequent decodes. This allows an attacker who can supply malicious CBOR messages to leverage the sharedref tag (29) to access residual data from previously decoded messages. Because the decoder instance is reused, data from prior messages can be leaked to later messages, violating data confidentiality boundaries. The flaw is classified under CWE-212 (Improper Removal of Sensitive Information Before Storage or Transfer). The vulnerability does not require authentication or user interaction and can be exploited remotely if an attacker can send crafted CBOR messages to a vulnerable service. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality and availability. The issue was resolved in cbor2 version 5.8.0 by ensuring that shareable tag data is properly cleared between decode operations, preventing cross-message data leakage. No known exploits are currently reported in the wild, but the vulnerability poses a risk to applications that process untrusted CBOR data streams using reused decoder instances. Organizations should audit their use of cbor2 and upgrade vulnerable versions to 5.8.0 or later.

Potential Impact

For European organizations, the primary impact of CVE-2025-68131 is unauthorized disclosure of sensitive information due to residual data leakage between CBOR messages. This can compromise confidentiality of data processed by applications using vulnerable cbor2 versions, especially in sectors handling sensitive personal data such as finance, healthcare, and government services. Since CBOR is used in IoT, embedded systems, and networked applications, the vulnerability could expose private keys, authentication tokens, or personal information if attacker-controlled messages are accepted. The flaw does not affect data integrity or availability directly but can undermine trust in data confidentiality and compliance with data protection regulations like GDPR. Organizations relying on cbor2 in microservices, APIs, or messaging systems that decode CBOR data from untrusted sources are at risk. The medium severity rating reflects moderate impact and ease of exploitation without authentication, emphasizing the need for timely patching to prevent data leaks.

Mitigation Recommendations

To mitigate CVE-2025-68131, European organizations should: 1) Immediately upgrade all instances of the agronholm cbor2 library to version 5.8.0 or later, where the vulnerability is patched. 2) Audit codebases and dependencies to identify any reuse of CBORDecoder instances across multiple decode operations, especially in contexts processing untrusted data. 3) Where upgrading is not immediately feasible, implement strict input validation and isolate decoding operations to prevent reuse of decoder instances across trust boundaries. 4) Employ runtime memory sanitization techniques or containerization to limit data persistence risks. 5) Monitor network traffic for anomalous CBOR messages that could exploit sharedref tags. 6) Educate developers on secure usage patterns of CBOR decoding libraries, emphasizing the risks of decoder reuse. 7) Incorporate vulnerability scanning and dependency management tools to detect vulnerable cbor2 versions in CI/CD pipelines. These targeted steps go beyond generic advice by focusing on the specific decoder reuse pattern and the CBOR tag semantics involved.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-15T18:05:52.210Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954835edb813ff03e856042

Added to database: 12/31/2025, 1:58:54 AM

Last enriched: 12/31/2025, 2:13:57 AM

Last updated: 12/31/2025, 4:07:38 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats