Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
2 vulnerabilities found for valtimo by valtimo-platform
CVE-2026-34164 (GCVE-0-2026-34164)
Vulnerability from nvd – Published: 2026-04-16 21:17 – Updated: 2026-04-18 02:44
VLAI?
Title
Valtimo: Sensitive data exposure through inbox message logging in InboxHandlingService
Summary
Valtimo is an open-source business process automation platform. In versions 13.0.0 through 13.21.0, the InboxHandlingService logs the full content of every incoming inbox message at INFO level. Inbox messages can contain highly sensitive information including personal data (PII), citizen identifiers (BSN), and case details. This data is exposed to anyone with access to application logs or any Valtimo user with the admin role through the Admin UI logging module. This issue has been fixed in version 13.22.0. If developers are unable to upgrade immediately, they can restrict access to application logs and adjust the log level for com.ritense.inbox to WARN or higher in their application configuration as a workaround.
Severity ?
4.9 (Medium)
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| valtimo-platform | valtimo |
Affected:
>= 13.0.0.RELEASE, < 13.22.0.RELEASE
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-34164",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-18T02:44:28.748652Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-18T02:44:44.369Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "valtimo",
"vendor": "valtimo-platform",
"versions": [
{
"status": "affected",
"version": "\u003e= 13.0.0.RELEASE, \u003c 13.22.0.RELEASE"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Valtimo is an open-source business process automation platform. In versions 13.0.0 through 13.21.0, the InboxHandlingService logs the full content of every incoming inbox message at INFO level. Inbox messages can contain highly sensitive information including personal data (PII), citizen identifiers (BSN), and case details. This data is exposed to anyone with access to application logs or any Valtimo user with the admin role through the Admin UI logging module. This issue has been fixed in version 13.22.0. If developers are unable to upgrade immediately, they can restrict access to application logs and adjust the log level for com.ritense.inbox to WARN or higher in their application configuration as a workaround."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-532",
"description": "CWE-532: Insertion of Sensitive Information into Log File",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-16T21:17:35.472Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-hfrg-mcvw-8mch",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-hfrg-mcvw-8mch"
},
{
"name": "https://github.com/generiekzaakafhandelcomponent/gzac-issues/issues/653",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/generiekzaakafhandelcomponent/gzac-issues/issues/653"
},
{
"name": "https://github.com/valtimo-platform/valtimo/pull/497",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/valtimo-platform/valtimo/pull/497"
},
{
"name": "https://github.com/valtimo-platform/valtimo/commit/f16a1940ba7b34627c0b966f98ca78655ace9335",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/valtimo-platform/valtimo/commit/f16a1940ba7b34627c0b966f98ca78655ace9335"
},
{
"name": "https://github.com/valtimo-platform/valtimo/releases/tag/13.22.0",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/valtimo-platform/valtimo/releases/tag/13.22.0"
}
],
"source": {
"advisory": "GHSA-hfrg-mcvw-8mch",
"discovery": "UNKNOWN"
},
"title": "Valtimo: Sensitive data exposure through inbox message logging in InboxHandlingService"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-34164",
"datePublished": "2026-04-16T21:17:35.472Z",
"dateReserved": "2026-03-25T20:12:04.197Z",
"dateUpdated": "2026-04-18T02:44:44.369Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-34164 (GCVE-0-2026-34164)
Vulnerability from cvelistv5 – Published: 2026-04-16 21:17 – Updated: 2026-04-18 02:44
VLAI?
Title
Valtimo: Sensitive data exposure through inbox message logging in InboxHandlingService
Summary
Valtimo is an open-source business process automation platform. In versions 13.0.0 through 13.21.0, the InboxHandlingService logs the full content of every incoming inbox message at INFO level. Inbox messages can contain highly sensitive information including personal data (PII), citizen identifiers (BSN), and case details. This data is exposed to anyone with access to application logs or any Valtimo user with the admin role through the Admin UI logging module. This issue has been fixed in version 13.22.0. If developers are unable to upgrade immediately, they can restrict access to application logs and adjust the log level for com.ritense.inbox to WARN or higher in their application configuration as a workaround.
Severity ?
4.9 (Medium)
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| valtimo-platform | valtimo |
Affected:
>= 13.0.0.RELEASE, < 13.22.0.RELEASE
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-34164",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-18T02:44:28.748652Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-18T02:44:44.369Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "valtimo",
"vendor": "valtimo-platform",
"versions": [
{
"status": "affected",
"version": "\u003e= 13.0.0.RELEASE, \u003c 13.22.0.RELEASE"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Valtimo is an open-source business process automation platform. In versions 13.0.0 through 13.21.0, the InboxHandlingService logs the full content of every incoming inbox message at INFO level. Inbox messages can contain highly sensitive information including personal data (PII), citizen identifiers (BSN), and case details. This data is exposed to anyone with access to application logs or any Valtimo user with the admin role through the Admin UI logging module. This issue has been fixed in version 13.22.0. If developers are unable to upgrade immediately, they can restrict access to application logs and adjust the log level for com.ritense.inbox to WARN or higher in their application configuration as a workaround."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-532",
"description": "CWE-532: Insertion of Sensitive Information into Log File",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-16T21:17:35.472Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-hfrg-mcvw-8mch",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-hfrg-mcvw-8mch"
},
{
"name": "https://github.com/generiekzaakafhandelcomponent/gzac-issues/issues/653",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/generiekzaakafhandelcomponent/gzac-issues/issues/653"
},
{
"name": "https://github.com/valtimo-platform/valtimo/pull/497",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/valtimo-platform/valtimo/pull/497"
},
{
"name": "https://github.com/valtimo-platform/valtimo/commit/f16a1940ba7b34627c0b966f98ca78655ace9335",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/valtimo-platform/valtimo/commit/f16a1940ba7b34627c0b966f98ca78655ace9335"
},
{
"name": "https://github.com/valtimo-platform/valtimo/releases/tag/13.22.0",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/valtimo-platform/valtimo/releases/tag/13.22.0"
}
],
"source": {
"advisory": "GHSA-hfrg-mcvw-8mch",
"discovery": "UNKNOWN"
},
"title": "Valtimo: Sensitive data exposure through inbox message logging in InboxHandlingService"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-34164",
"datePublished": "2026-04-16T21:17:35.472Z",
"dateReserved": "2026-03-25T20:12:04.197Z",
"dateUpdated": "2026-04-18T02:44:44.369Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}