Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22041: CWE-704: Incorrect Type Conversion or Cast in armurox loggingredactor

0
Low
VulnerabilityCVE-2026-22041cvecve-2026-22041cwe-704
Published: Thu Jan 08 2026 (01/08/2026, 14:52:37 UTC)
Source: CVE Database V5
Vendor/Project: armurox
Product: loggingredactor

Description

Logging Redactor is a Python library designed to redact sensitive data in logs based on regex patterns and / or dictionary keys. Prior to version 0.0.6, non-string types are converted into string types, leading to type errors in %d conversions. The problem has been patched in version 0.0.6. No known workarounds are available.

AI-Powered Analysis

AILast updated: 01/08/2026, 15:20:18 UTC

Technical Analysis

CVE-2026-22041 is classified under CWE-704, indicating an incorrect type conversion or cast vulnerability in the armurox loggingredactor Python library. This library is designed to redact sensitive information from logs using regex patterns or dictionary keys. In versions prior to 0.0.6, the library converts non-string data types into strings indiscriminately. This conversion leads to type errors when the loggingredactor attempts to apply %d format specifiers, which expect integer types, but receive string representations instead. Such errors can cause logging operations to fail or raise exceptions, potentially disrupting application workflows that rely on consistent logging. The vulnerability does not expose sensitive data directly but affects the integrity and availability of logging outputs. The CVSS 4.0 base score is 2.0, reflecting low severity due to the local attack vector, low impact on confidentiality, and no requirement for privileges or user interaction. No known exploits have been reported, and the issue was patched in version 0.0.6. The lack of workarounds means that upgrading is the only effective remediation. This vulnerability is primarily a stability and reliability concern for applications using the affected library versions.

Potential Impact

For European organizations, the primary impact of CVE-2026-22041 is on the reliability and integrity of logging systems. Organizations that rely heavily on automated log redaction to comply with data protection regulations such as GDPR may experience failures in redacting sensitive information, potentially leading to incomplete or inconsistent logs. This could indirectly affect compliance audits or forensic investigations. Additionally, applications encountering type errors during logging might experience crashes or degraded performance, impacting availability. While the vulnerability does not directly compromise confidentiality or allow remote exploitation, the disruption of logging can hinder incident detection and response capabilities. Sectors with stringent logging requirements, such as finance, healthcare, and critical infrastructure, could face operational challenges if affected versions are in use. The low severity suggests limited direct risk, but the operational impact on logging integrity warrants timely remediation.

Mitigation Recommendations

European organizations should immediately upgrade the armurox loggingredactor library to version 0.0.6 or later to eliminate the vulnerability. Since no workarounds exist, patching is the only effective mitigation. Additionally, organizations should audit their codebases and dependency manifests to identify any usage of affected versions and ensure they are updated. Implementing robust testing around logging functionality can help detect failures caused by type conversion issues. Where feasible, developers should validate data types before passing them to loggingredactor functions to prevent unexpected type errors. Monitoring application logs for errors related to loggingredactor can provide early warning of exploitation attempts or failures. Finally, organizations should maintain an inventory of third-party libraries and subscribe to vulnerability feeds to promptly address similar issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T22:30:38.720Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695fc7afc901b06321f951a1

Added to database: 1/8/2026, 3:05:19 PM

Last enriched: 1/8/2026, 3:20:18 PM

Last updated: 1/9/2026, 10:57:09 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats