CVE-2025-68131: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in agronholm cbor2
CVE-2025-68131 is a medium severity vulnerability in the agronholm cbor2 library versions 3. 0. 0 up to but not including 5. 8. 0. The flaw arises when a CBORDecoder instance is reused across multiple decode operations, causing values tagged as shareable (tag 28) to persist in memory. This persistence allows attacker-controlled messages using the sharedref tag (29) to access data from previously decoded messages, leading to potential unauthorized data disclosure across trust boundaries. No authentication or user interaction is required, and exploitation is possible remotely over the network. The vulnerability has a CVSS 4. 0 base score of 5.
AI Analysis
Technical Summary
The vulnerability CVE-2025-68131 affects the agronholm cbor2 Python library, which implements encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Specifically, from version 3.0.0 through versions prior to 5.8.0, the CBORDecoder class exhibits improper handling of shareable data tags. When a CBORDecoder instance is reused for multiple decode operations, values marked with the shareable tag (28) remain in memory and are not properly cleared before subsequent decodes. This allows an attacker who can supply malicious CBOR messages to leverage the sharedref tag (29) to access residual data from previously decoded messages. Because the decoder instance is reused, data from prior messages can be leaked to later messages, violating data confidentiality boundaries. The flaw is classified under CWE-212 (Improper Removal of Sensitive Information Before Storage or Transfer). The vulnerability does not require authentication or user interaction and can be exploited remotely if an attacker can send crafted CBOR messages to a vulnerable service. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality and availability. The issue was resolved in cbor2 version 5.8.0 by ensuring that shareable tag data is properly cleared between decode operations, preventing cross-message data leakage. No known exploits are currently reported in the wild, but the vulnerability poses a risk to applications that process untrusted CBOR data streams using reused decoder instances. Organizations should audit their use of cbor2 and upgrade vulnerable versions to 5.8.0 or later.
Potential Impact
For European organizations, the primary impact of CVE-2025-68131 is unauthorized disclosure of sensitive information due to residual data leakage between CBOR messages. This can compromise confidentiality of data processed by applications using vulnerable cbor2 versions, especially in sectors handling sensitive personal data such as finance, healthcare, and government services. Since CBOR is used in IoT, embedded systems, and networked applications, the vulnerability could expose private keys, authentication tokens, or personal information if attacker-controlled messages are accepted. The flaw does not affect data integrity or availability directly but can undermine trust in data confidentiality and compliance with data protection regulations like GDPR. Organizations relying on cbor2 in microservices, APIs, or messaging systems that decode CBOR data from untrusted sources are at risk. The medium severity rating reflects moderate impact and ease of exploitation without authentication, emphasizing the need for timely patching to prevent data leaks.
Mitigation Recommendations
To mitigate CVE-2025-68131, European organizations should: 1) Immediately upgrade all instances of the agronholm cbor2 library to version 5.8.0 or later, where the vulnerability is patched. 2) Audit codebases and dependencies to identify any reuse of CBORDecoder instances across multiple decode operations, especially in contexts processing untrusted data. 3) Where upgrading is not immediately feasible, implement strict input validation and isolate decoding operations to prevent reuse of decoder instances across trust boundaries. 4) Employ runtime memory sanitization techniques or containerization to limit data persistence risks. 5) Monitor network traffic for anomalous CBOR messages that could exploit sharedref tags. 6) Educate developers on secure usage patterns of CBOR decoding libraries, emphasizing the risks of decoder reuse. 7) Incorporate vulnerability scanning and dependency management tools to detect vulnerable cbor2 versions in CI/CD pipelines. These targeted steps go beyond generic advice by focusing on the specific decoder reuse pattern and the CBOR tag semantics involved.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-68131: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in agronholm cbor2
Description
CVE-2025-68131 is a medium severity vulnerability in the agronholm cbor2 library versions 3. 0. 0 up to but not including 5. 8. 0. The flaw arises when a CBORDecoder instance is reused across multiple decode operations, causing values tagged as shareable (tag 28) to persist in memory. This persistence allows attacker-controlled messages using the sharedref tag (29) to access data from previously decoded messages, leading to potential unauthorized data disclosure across trust boundaries. No authentication or user interaction is required, and exploitation is possible remotely over the network. The vulnerability has a CVSS 4. 0 base score of 5.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-68131 affects the agronholm cbor2 Python library, which implements encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Specifically, from version 3.0.0 through versions prior to 5.8.0, the CBORDecoder class exhibits improper handling of shareable data tags. When a CBORDecoder instance is reused for multiple decode operations, values marked with the shareable tag (28) remain in memory and are not properly cleared before subsequent decodes. This allows an attacker who can supply malicious CBOR messages to leverage the sharedref tag (29) to access residual data from previously decoded messages. Because the decoder instance is reused, data from prior messages can be leaked to later messages, violating data confidentiality boundaries. The flaw is classified under CWE-212 (Improper Removal of Sensitive Information Before Storage or Transfer). The vulnerability does not require authentication or user interaction and can be exploited remotely if an attacker can send crafted CBOR messages to a vulnerable service. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality and availability. The issue was resolved in cbor2 version 5.8.0 by ensuring that shareable tag data is properly cleared between decode operations, preventing cross-message data leakage. No known exploits are currently reported in the wild, but the vulnerability poses a risk to applications that process untrusted CBOR data streams using reused decoder instances. Organizations should audit their use of cbor2 and upgrade vulnerable versions to 5.8.0 or later.
Potential Impact
For European organizations, the primary impact of CVE-2025-68131 is unauthorized disclosure of sensitive information due to residual data leakage between CBOR messages. This can compromise confidentiality of data processed by applications using vulnerable cbor2 versions, especially in sectors handling sensitive personal data such as finance, healthcare, and government services. Since CBOR is used in IoT, embedded systems, and networked applications, the vulnerability could expose private keys, authentication tokens, or personal information if attacker-controlled messages are accepted. The flaw does not affect data integrity or availability directly but can undermine trust in data confidentiality and compliance with data protection regulations like GDPR. Organizations relying on cbor2 in microservices, APIs, or messaging systems that decode CBOR data from untrusted sources are at risk. The medium severity rating reflects moderate impact and ease of exploitation without authentication, emphasizing the need for timely patching to prevent data leaks.
Mitigation Recommendations
To mitigate CVE-2025-68131, European organizations should: 1) Immediately upgrade all instances of the agronholm cbor2 library to version 5.8.0 or later, where the vulnerability is patched. 2) Audit codebases and dependencies to identify any reuse of CBORDecoder instances across multiple decode operations, especially in contexts processing untrusted data. 3) Where upgrading is not immediately feasible, implement strict input validation and isolate decoding operations to prevent reuse of decoder instances across trust boundaries. 4) Employ runtime memory sanitization techniques or containerization to limit data persistence risks. 5) Monitor network traffic for anomalous CBOR messages that could exploit sharedref tags. 6) Educate developers on secure usage patterns of CBOR decoding libraries, emphasizing the risks of decoder reuse. 7) Incorporate vulnerability scanning and dependency management tools to detect vulnerable cbor2 versions in CI/CD pipelines. These targeted steps go beyond generic advice by focusing on the specific decoder reuse pattern and the CBOR tag semantics involved.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-15T18:05:52.210Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6954835edb813ff03e856042
Added to database: 12/31/2025, 1:58:54 AM
Last enriched: 12/31/2025, 2:13:57 AM
Last updated: 12/31/2025, 4:07:38 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15372: Cross Site Scripting in youlaitech vue3-element-admin
MediumCVE-2025-15223: Cross Site Scripting in Philipinho Simple-PHP-Blog
MediumCVE-2025-15371: Hard-coded Credentials in Tenda i24
HighCVE-2025-11964: CWE-787 Out-of-bounds Write in The Tcpdump Group libpcap
LowCVE-2025-11961: CWE-126 Buffer Over-read in The Tcpdump Group libpcap
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.