{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14010","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2025-12-04T09:30:09.669Z","datePublished":"2025-12-04T09:51:55.868Z","dateUpdated":"2026-05-06T16:49:09.459Z"},"containers":{"cna":{"title":"Ansible-collection-community-general: ansible-collection-community-general: keycloak user module leaks credentials in verbose output","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in ansible-collection-community-general. This vulnerability allows for information exposure (IE) of sensitive credentials, specifically plaintext passwords, via verbose output when running Ansible with debug modes. Attackers with access to logs could retrieve these secrets and potentially compromise Keycloak accounts or administrative access."}],"affected":[{"vendor":"ansible-collections","product":"Ansible Community General Collection","versions":[{"status":"affected","version":"7.1.0","lessThan":"9.5.13","versionType":"semver"},{"status":"affected","version":"10.0.0","lessThan":"10.7.6","versionType":"semver"},{"status":"affected","version":"11.0.0","lessThan":"11.4.1","versionType":"semver"},{"status":"affected","version":"12.0.0","lessThan":"12.2.0","versionType":"semver"}],"packageName":"ansible-collection-community-general","collectionURL":"https://github.com/ansible-collections/community.general","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"Red Hat Ceph Storage 5","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"ansible-collection-community-general","defaultStatus":"affected","cpes":["cpe:/a:redhat:ceph_storage:5"]},{"vendor":"Red Hat","product":"Red Hat Ceph Storage 6","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"ansible-collection-community-general","defaultStatus":"affected","cpes":["cpe:/a:redhat:ceph_storage:6"]},{"vendor":"Red Hat","product":"Red Hat Ceph Storage 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"ansible-collection-community-general","defaultStatus":"affected","cpes":["cpe:/a:redhat:ceph_storage:7"]},{"vendor":"Red Hat","product":"Red Hat Ceph Storage 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"ansible-collection-community-general","defaultStatus":"affected","cpes":["cpe:/a:redhat:ceph_storage:8"]},{"vendor":"Red Hat","product":"Red Hat OpenStack Platform 17.1","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"ansible-collection-community-general","defaultStatus":"affected","cpes":["cpe:/a:redhat:openstack:17.1"]},{"vendor":"Red Hat","product":"Red Hat OpenStack Platform 18.0","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"ansible-collection-community-general","defaultStatus":"affected","cpes":["cpe:/a:redhat:openstack:18.0"]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2025-14010","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418774","name":"RHBZ#2418774","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://github.com/ansible-collections/community.general/issues/11000"},{"url":"https://github.com/ansible-collections/community.general/pull/11005"},{"url":"https://github.com/ansible-community/ansible-build-data/blob/main/12/CHANGELOG-v12.md#security-fixes"}],"datePublic":"2025-12-04T00:00:00.000Z","workarounds":[{"lang":"en","value":"Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}],"timeline":[{"lang":"en","time":"2025-12-04T09:28:27.098Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-12-04T00:00:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank Chris Conway for reporting this issue."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-05-06T16:49:09.459Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-532","lang":"en","description":"CWE-532 Insertion of Sensitive Information into Log File"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-05T17:22:53.670811Z","id":"CVE-2025-14010","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-23T14:40:13.799Z"}}]}}