{"id":"CVE-2025-54376","summary":"Hoverfly's WebSocket endpoint `/api/v2/ws/logs` reachable without authentication even when --auth is enabled.","details":"Hoverfly is an open source API simulation tool. In versions 1.11.3 and prior, Hoverfly’s admin WebSocket endpoint /api/v2/ws/logs is not protected by the same authentication middleware that guards the REST admin API. Consequently, an unauthenticated remote attacker can stream real-time application logs (information disclosure) and/or gain insight into internal file paths, request/response bodies, and other potentially sensitive data emitted in logs. Version 1.12.0 contains a fix for the issue.","aliases":["GHSA-jxmr-2h4q-rhxp","GO-2025-3945"],"modified":"2026-04-20T04:08:40.047902Z","published":"2025-09-10T19:49:08.752Z","related":["SUSE-SU-2025:03289-1","openSUSE-SU-2025:15564-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/54xxx/CVE-2025-54376.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-200","CWE-287"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/54xxx/CVE-2025-54376.json"},{"type":"ADVISORY","url":"https://github.com/SpectoLabs/hoverfly/security/advisories/GHSA-jxmr-2h4q-rhxp"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-54376"},{"type":"FIX","url":"https://github.com/SpectoLabs/hoverfly/commit/ffc2cc34563de67fe1a04f7ba5d78fa2d4564424"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/spectolabs/hoverfly","events":[{"introduced":"0"},{"fixed":"513aa52ec643df85601c8a2291372ae179d26c09"},{"fixed":"ffc2cc34563de67fe1a04f7ba5d78fa2d4564424"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.12.0"}]}}],"versions":["v0.1","v0.10.0","v0.10.1","v0.10.2","v0.10.3","v0.11.0","v0.11.1","v0.11.2","v0.11.3","v0.11.4","v0.11.5","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.13.0","v0.14.0","v0.14.1","v0.14.2","v0.15.0","v0.15.1","v0.16.0","v0.17.0","v0.17.1","v0.17.2","v0.17.3","v0.17.4","v0.17.5","v0.17.6","v0.17.7","v0.2","v0.3","v0.4","v0.5","v0.5.1","v0.5.10","v0.5.11","v0.5.12","v0.5.13","v0.5.14","v0.5.15","v0.5.16","v0.5.17","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.6","v0.5.7","v0.5.8","v0.5.9","v0.6.0","v0.7.0","v0.7.1","v0.8.0","v0.8.1","v0.8.2","v0.9.0","v0.9.1","v0.9.2","v1.0.0","v1.0.0-rc.1","v1.0.0-rc.2","v1.0.1","v1.1.0","v1.1.1","v1.1.2","v1.1.3","v1.1.4","v1.1.5","v1.10.0","v1.10.1","v1.10.10","v1.10.11","v1.10.12","v1.10.13","v1.10.2","v1.10.3","v1.10.4","v1.10.5","v1.10.6","v1.10.7","v1.10.8","v1.10.9","v1.11.0","v1.11.1","v1.11.2","v1.11.3","v1.2.0","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.6","v1.3.7","v1.4.0","v1.5.0","v1.5.1","v1.5.2","v1.5.3","v1.6.0","v1.6.1","v1.6.2","v1.6.3","v1.7.0","v1.8.0","v1.9.0","v1.9.1","v1.9.2","v1.9.3","v1.9.4","v1.9.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-54376.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P"}]}