Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2024-58269

CVE-2024-58269: Rancher exposes sensitive information through audit logs

October 24, 2025 (updated October 31, 2025)

Note: The exploitation of this issue requires that the malicious user have access to Rancher’s audit log storage.

A vulnerability has been identified in Rancher Manager, where sensitive information, including secret data, cluster import URLs, and registration tokens, is exposed to any entity with access to Rancher audit logs. This happens in two different ways:

  1. Secret Annotation Leakage: When creating Kubernetes Secrets using the stringData field, the cleartext value is embedded in the kubectl.kubernetes.io/last-applied-configuration annotation. This annotation is included in Rancher audit logs within both the request and response bodies, exposing secret material that should be redacted.
  2. Cluster Registration Token Leakage: During the import or creation of downstream clusters (Custom, Imported, or Harvester), Rancher audit logs record full cluster registration manifests and tokens, including: a. Non-expiring import URLs such as /v3/import/<token>_c-m-xxxx.yaml. b. Full kubectl apply and curl commands containing registration tokens and CA checksums. c. Token values associated with cluster registration resources (clusterRegistrationToken). d. These tokens are valid until explicitly revoked and can be used to re-register nodes, granting unauthorized cluster access.

An attacker or internal user who gains access to these logs could:

  • Recover plaintext secret values from annotations.
  • Use cluster registration tokens or import URLs to re-enroll agents or compromise downstream clusters.
  • Access clusters that rely on these tokens for authentication, enabling lateral movement.

Please consult the associated MITRE ATT&CK - Technique - Log Enumeration for further information about this category of attack.

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2024-58269
  • github.com/advisories/GHSA-mw39-9qc2-f7mg
  • github.com/rancher/rancher
  • github.com/rancher/rancher/commit/26ad9216e94f77b5471f638256a6989030572adc
  • github.com/rancher/rancher/commit/50dc516a19ea216e270f738912dc8d0c9ca99d5d
  • github.com/rancher/rancher/security/advisories/GHSA-mw39-9qc2-f7mg
  • nvd.nist.gov/vuln/detail/CVE-2024-58269

Code Behaviors & Features

Detect and mitigate CVE-2024-58269 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20251013203444-50dc516a19ea

Fixed versions

  • 0.0.0-20251013203444-50dc516a19ea

Solution

Upgrade to version 0.0.0-20251013203444-50dc516a19ea or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-532: Insertion of Sensitive Information into Log File

Source file

go/github.com/rancher/rancher/CVE-2024-58269.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 07 Nov 2025 12:19:15 +0000.