CVE-2025-57813
vulnerability analysis and mitigation

Overview

CVE-2025-57813 affects traQ, a messenger application built for Digital Creators Club traP. The vulnerability was discovered and disclosed on August 25, 2025, affecting versions prior to 3.25.0. The issue involves sensitive information exposure, specifically OAuth tokens, being recorded in log files during SQL query execution errors (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-532 (Insertion of Sensitive Information into Log File) with a CVSS v3.1 score of 5.9 (Medium). The vulnerability vector is CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N, indicating network attack vector, high attack complexity, high privileges required, no user interaction needed, unchanged scope, and high impact on confidentiality and integrity with no impact on availability (GitHub Advisory).

Impact

The vulnerability could allow attackers with log file access permissions to acquire sensitive information such as OAuth tokens. Both human users and Bot OAuth tokens could potentially be exposed. The exposure occurs when an attacker intentionally triggers SQL errors, such as by placing a high load on the database (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 3.25.0. For users unable to upgrade immediately, temporary workarounds include reviewing and strictly limiting access permissions for SQL error logs. Additionally, it is recommended to invalidate OAuth tokens of human users by executing a specific SQL statement: 'UPDATE oauth2tokens SET deletedat = NOW() WHERE deleted_at IS NULL AND scopes != "bot"'. Note that revoking Bot access tokens is not recommended as it may cause errors (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management