CVE-2026-27900: Terraform Provider for Linode Debug Logs Vulnerable to Sensitive Information Exposure
The Terraform Provider for Linode versions prior to v3.9.0 logged sensitive information including some passwords, StackScript content, object storage data, and NodeBalancer TLS keys in debug logs without redaction.
Important: Provider debug logging is not enabled by default. This issue is exposed when debug/provider logs are explicitly enabled (for example in local troubleshooting, CI/CD jobs, or centralized log collection). If enabled, sensitive values may be written to logs and then retained, shared, or exported beyond the original execution environment.
Specifically:
- Instance creation operations logged the full InstanceCreateOptions struct containing RootPass and StackScriptData
- Instance disk creation logged InstanceDiskCreateOptions containing RootPass and StackscriptData
- StackScript update operations logged the complete script content via StackscriptUpdateOptions.Script
- Image share group member creation logged tokens in ImageShareGroupAddMemberOptions.Token
- Object storage operations logged full PutObjectInput structures containing user data
- NodeBalancer config create and update operations logged NodeBalancerConfigCreateOptions and NodeBalancerConfigUpdateOptions containing the SSLKey (TLS private key)
An authenticated user with access to provider debug logs (through log aggregation systems, CI/CD pipelines, or debug output) would thus be able to extract these sensitive credentials.
References
- github.com/advisories/GHSA-5rc7-2jj6-mp64
- github.com/linode/terraform-provider-linode
- github.com/linode/terraform-provider-linode/commit/43a925d826b999f0355de3dc7330c55f496824c0
- github.com/linode/terraform-provider-linode/pull/2269
- github.com/linode/terraform-provider-linode/releases/tag/v3.9.0
- github.com/linode/terraform-provider-linode/security/advisories/GHSA-5rc7-2jj6-mp64
- nvd.nist.gov/vuln/detail/CVE-2026-27900
Code Behaviors & Features
Detect and mitigate CVE-2026-27900 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →