Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68131: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in agronholm cbor2

0
Medium
VulnerabilityCVE-2025-68131cvecve-2025-68131cwe-212
Published: Wed Dec 31 2025 (12/31/2025, 01:15:36 UTC)
Source: CVE Database V5
Vendor/Project: agronholm
Product: cbor2

Description

cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Starting in version 3.0.0 and prior to version 5.8.0, whhen a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory and can be accessed by subsequent CBOR messages using the sharedref tag (29). This allows an attacker-controlled message to read data from previously decoded messages if the decoder is reused across trust boundaries. Version 5.8.0 patches the issue.

AI-Powered Analysis

AILast updated: 01/07/2026, 03:28:10 UTC

Technical Analysis

The vulnerability CVE-2025-68131 affects the agronholm cbor2 Python library, which implements encoding and decoding for the Concise Binary Object Representation (CBOR) format. CBOR is a binary data serialization format commonly used in IoT, embedded systems, and network protocols due to its compactness and efficiency. Starting from version 3.0.0 and prior to 5.8.0, the CBORDecoder class in cbor2 exhibits improper handling of shared references when decoder instances are reused. Specifically, values tagged with the shareable tag (28) persist in the decoder's internal memory state after decoding a message. Subsequent CBOR messages that include sharedref tags (29) can access these lingering values. This behavior violates the principle of proper removal of sensitive information before storage or transfer, classified under CWE-212. An attacker who can supply malicious CBOR messages to a system that reuses a CBORDecoder instance across trust boundaries can exploit this flaw to read sensitive data from previously decoded messages. The vulnerability requires no authentication or user interaction and can be exploited remotely if the attacker can send crafted CBOR data to the vulnerable decoder. The flaw is patched in cbor2 version 5.8.0, which ensures that shared values do not persist across decode operations. No known exploits are currently reported in the wild. The CVSS 4.0 base score is 5.5 (medium severity), reflecting the moderate impact on confidentiality with no impact on integrity or availability, and ease of exploitation without privileges or user interaction.

Potential Impact

For European organizations, the primary impact of CVE-2025-68131 is the potential leakage of sensitive information processed via CBOR serialization. This is particularly relevant for sectors relying on Python-based services or IoT devices that use cbor2 for data interchange. Confidential data from previous decoding operations can be exposed to attackers who can send malicious CBOR messages, leading to breaches of privacy, intellectual property theft, or exposure of credentials and tokens. This risk is heightened in multi-tenant environments, cloud services, or any system where CBORDecoder instances are reused across different trust domains. While the vulnerability does not affect data integrity or system availability, the confidentiality breach could lead to regulatory non-compliance under GDPR and damage organizational reputation. The medium severity score reflects the moderate but non-trivial risk, especially in environments processing sensitive or regulated data.

Mitigation Recommendations

The most effective mitigation is to upgrade the agronholm cbor2 library to version 5.8.0 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should ensure that CBORDecoder instances are not reused across different trust boundaries; instead, instantiate a new decoder for each decoding operation to prevent shared state persistence. Additionally, input validation and strict access controls should be enforced to limit exposure to untrusted CBOR data sources. Security teams should audit codebases and IoT device firmware for usage of vulnerable cbor2 versions and implement monitoring for anomalous CBOR message patterns that could indicate exploitation attempts. Incorporating secure coding practices around serialization and deserialization, including memory clearing and object lifecycle management, will reduce risk. Finally, organizations should review their incident response plans to include scenarios involving serialization-based data leakage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-15T18:05:52.210Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954835edb813ff03e856042

Added to database: 12/31/2025, 1:58:54 AM

Last enriched: 1/7/2026, 3:28:10 AM

Last updated: 2/6/2026, 7:50:48 PM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats