Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/cloudnativelabs/kube-router/v2
  4. ›
  5. GHSA-fcmh-qfxc-w685

GHSA-fcmh-qfxc-w685: kube-router: BGP Peer Passwords Exposed in Logs at Verbose Logging Level

April 8, 2026

When kube-router is configured with per-node BGP peer passwords using the kube-router.io/peer.passwords node annotation, and verbose logging is enabled (--v=2 or higher), the raw Kubernetes node annotation map is logged verbatim — including the base64-encoded BGP MD5 passwords. Anyone with access to kube-router’s logs (via kubectl logs, log aggregation systems, or shared log dumps during debugging) can extract and decode the BGP peer passwords. The official troubleshooting documentation instructs users to collect logs at -v=2 before filing issues, making accidental disclosure during support interactions a realistic scenario.

References

  • github.com/advisories/GHSA-fcmh-qfxc-w685
  • github.com/cloudnativelabs/kube-router
  • github.com/cloudnativelabs/kube-router/security/advisories/GHSA-fcmh-qfxc-w685

Code Behaviors & Features

Detect and mitigate GHSA-fcmh-qfxc-w685 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.7.0 up to 2.8.0

Solution

Unfortunately, there is no solution available yet.

Impact 4.1 MEDIUM

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-532: Insertion of Sensitive Information into Log File

Source file

go/github.com/cloudnativelabs/kube-router/v2/GHSA-fcmh-qfxc-w685.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:21 +0000.