Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. tracing-subscriber
  4. ›
  5. CVE-2025-58160

CVE-2025-58160: Tracing logging user input may result in poisoning logs with ANSI escape sequences

August 29, 2025

Previous versions of tracing-subscriber were vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be injected into terminal output when logged, potentially allowing attackers to:

  • Manipulate terminal title bars
  • Clear screens or modify terminal display
  • Potentially mislead users through terminal manipulation

In isolation, impact is minimal, however security issues have been found in terminal emulators that enabled an attacker to use ANSI escape sequences via logs to exploit vulnerabilities in the terminal emulator.

References

  • github.com/advisories/GHSA-xwfj-jgwm-7wp5
  • github.com/tokio-rs/tracing
  • github.com/tokio-rs/tracing/security/advisories/GHSA-xwfj-jgwm-7wp5
  • nvd.nist.gov/vuln/detail/CVE-2025-58160

Code Behaviors & Features

Detect and mitigate CVE-2025-58160 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.3.20

Fixed versions

  • 0.3.20

Solution

Upgrade to version 0.3.20 or above.

Weakness

  • CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences

Source file

cargo/tracing-subscriber/CVE-2025-58160.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 30 Aug 2025 00:20:13 +0000.