CVE-2023-48700
Python vulnerability analysis and mitigation

Overview

The Nautobot Device Onboarding plugin (versions 2.0.0 to 3.0.0) contains a vulnerability where credentials provided to onboarding tasks are exposed in clear text via Job Results. The vulnerability was discovered and disclosed on November 21, 2023, affecting installations using the plugin for device onboarding into Nautobot. This issue specifically impacts instances where credentials are specified during OnboardingTask creation while using versions 2.0.0-2.0.2 (GitHub Advisory).

Technical details

The vulnerability (CVE-2023-48700) allows visibility of clear text credentials through the Job Results view under the Additional Data tab, where they appear as args for the Celery Task execution. The issue has a CVSS v3.1 base score of 6.5 (Medium) according to NVD, with a vector string of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. The vulnerability does not affect installations using NAPALM_USERNAME & NAPALM_PASSWORD from nautobot_config.py or versions prior to 2.0.0 (GitHub Advisory).

Impact

The exposure of clear text credentials in Job Results poses a significant security risk as it could allow unauthorized access to sensitive authentication information. This could potentially lead to unauthorized access to network devices if the exposed credentials are valid and not rotated (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 3.0.0. Recommended mitigation steps include: 1) Deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, 2) Upgrading to v3.0.0, and 3) Rotating any exposed credentials. There are no known workarounds for this vulnerability other than implementing the recommended fixes (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-5882-5rx9-xgxpCRITICAL10
  • PythonPython
  • crawl4ai
NoYesJan 16, 2026
CVE-2026-23949HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 20, 2026
GHSA-vx9w-5cx4-9796HIGH8.6
  • PythonPython
  • crawl4ai
NoYesJan 16, 2026
CVE-2026-23535HIGH8
  • PythonPython
  • wlc
NoYesJan 16, 2026
CVE-2026-23490HIGH7.5
  • PythonPython
  • fence-agents-intelmodular
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management