
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-24355 affects Updatecli, a popular file update tool with over 1.2 million downloads. The vulnerability was discovered and disclosed on January 24, 2025, impacting versions prior to 0.93.0. The issue occurs when Updatecli is configured with Maven source using basic authentication credentials, where private credentials may be exposed in application logs during unsuccessful retrieval operations (NVD, SecurityOnline).
The vulnerability has been assigned a CVSS v3.0 base score of 7.1 (High) with the vector string CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N. The issue stems from improper credential handling during Maven repository operations. While credentials are properly sanitized for successful operations, they are exposed in clear text within application execution logs when operations fail due to issues such as incorrect artifact coordinates, non-existent versions, or other retrieval errors (GitHub Advisory).
The vulnerability can lead to the exposure of sensitive authentication credentials (usernames and tokens) used for accessing private Maven repositories. These credentials may be leaked in clear text within console or CI logs, potentially compromising access to private repository resources (GitHub Advisory).
The vulnerability has been patched in Updatecli version 0.93.0. Users are strongly recommended to upgrade to this version immediately to prevent credential exposure. The patch ensures proper credential sanitization even during failed operations (SecurityOnline).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."