Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27900: CWE-532: Insertion of Sensitive Information into Log File in linode terraform-provider-linode

0
Medium
VulnerabilityCVE-2026-27900cvecve-2026-27900cwe-532
Published: Thu Feb 26 2026 (02/26/2026, 00:53:19 UTC)
Source: CVE Database V5
Vendor/Project: linode
Product: terraform-provider-linode

Description

The Terraform Provider for Linode versions prior to v3.9.0 logged sensitive information including some passwords, StackScript content, and object storage data in debug logs without redaction. Provider debug logging is not enabled by default. This issue is exposed when debug/provider logs are explicitly enabled (for example in local troubleshooting, CI/CD jobs, or centralized log collection). If enabled, sensitive values may be written to logs and then retained, shared, or exported beyond the original execution environment. An authenticated user with access to provider debug logs (through log aggregation systems, CI/CD pipelines, or debug output) would thus be able to extract these sensitive credentials. Versions 3.9.0 and later sanitize debug logs by logging only non-sensitive metadata such as labels, regions, and resource IDs while redacting credentials, tokens, keys, scripts, and other sensitive content. Some other mitigations and workarounds are available. Disable Terraform/provider debug logging or set it to `WARN` level or above, restrict access to existing and historical logs, purge/retention-trim logs that may contain sensitive values, and/or rotate potentially exposed secrets/credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:40:24 UTC

Technical Analysis

CVE-2026-27900 concerns the Terraform Provider for Linode, a plugin used to manage Linode cloud resources via Terraform. In versions prior to 3.9.0, when debug logging is enabled, the provider logs sensitive information such as passwords, StackScript content, and object storage data in plaintext without any redaction. This logging behavior exposes sensitive credentials and secrets to anyone with access to these debug logs. Debug logging is not enabled by default, but it is often turned on during local troubleshooting, CI/CD pipeline runs, or centralized log aggregation for diagnostics. If an attacker or unauthorized user gains access to these logs, they can extract sensitive data, potentially leading to unauthorized access or data breaches. The vulnerability is classified under CWE-532, which involves the insertion of sensitive information into log files. The issue was resolved in version 3.9.0 by sanitizing debug logs to only include non-sensitive metadata such as labels, regions, and resource IDs, while redacting credentials, tokens, keys, and scripts. Additional mitigations include disabling debug logging or setting log levels to WARN or higher, restricting access to logs, purging logs containing sensitive data, and rotating any credentials that may have been exposed. The CVSS v3.1 base score is 5.0, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges, no user interaction, and partial confidentiality impact. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of this vulnerability is the potential exposure of sensitive credentials and secrets through debug logs. If an attacker or unauthorized user gains access to these logs, they could extract passwords, API tokens, StackScript content, and object storage data, which could lead to unauthorized access to cloud resources, data exfiltration, or further compromise of infrastructure. Organizations using affected versions of the Terraform Provider for Linode in environments where debug logging is enabled and logs are aggregated or retained without strict access controls are at risk. This exposure could undermine the confidentiality of sensitive information and potentially lead to privilege escalation or lateral movement within cloud environments. However, since debug logging is not enabled by default and exploitation requires access to logs and some level of authentication, the overall risk is moderated. The vulnerability does not impact integrity or availability directly. The scope includes any organization using Linode cloud infrastructure managed via Terraform with the vulnerable provider versions and debug logging enabled, especially in automated CI/CD or centralized logging environments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first upgrade the Terraform Provider for Linode to version 3.9.0 or later, where debug logs are sanitized to redact sensitive information. If upgrading immediately is not feasible, disable debug logging or set the logging level to WARN or higher to prevent sensitive data from being logged. Restrict access to existing and historical debug logs by enforcing strict access controls and auditing log access. Purge or trim retention of logs that may contain sensitive information to minimize exposure. Rotate any credentials, passwords, tokens, or keys that may have been exposed through debug logs to invalidate compromised secrets. Additionally, review CI/CD pipelines and centralized logging configurations to ensure debug logs are not inadvertently exposed or retained longer than necessary. Implement monitoring and alerting for unusual access to logs or credential usage to detect potential exploitation attempts. Finally, educate development and operations teams about the risks of enabling debug logging in production or shared environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T15:19:29.718Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699fa148b7ef31ef0b7796a3

Added to database: 2/26/2026, 1:26:32 AM

Last enriched: 3/5/2026, 11:40:24 AM

Last updated: 4/12/2026, 5:34:25 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses