First published: Mon Mar 10 2025(Updated: )
Nomad Community and Nomad Enterprise (“Nomad”) are vulnerable to unintentional exposure of the workload identity token and client secret token in audit logs. This vulnerability, identified as CVE-2025-1296, is fixed in Nomad Community Edition 1.9.7 and Nomad Enterprise 1.9.7, 1.8.11, and 1.7.19.
Credit: security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/nomad | <=1.9.6 | |
HashiCorp Nomad | <1.9.7 | |
HashiCorp Nomad | >=1.7.19<1.9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1296 pertains to the unintentional exposure of workload identity and client secret tokens in the audit logs of HashiCorp Nomad.
CVE-2025-1296 affects HashiCorp Nomad Community Edition versions up to 1.9.6 and Nomad Enterprise versions from 1.7.19 up to 1.9.6.
To remediate CVE-2025-1296, you should upgrade to Nomad Community Edition version 1.9.7 or Nomad Enterprise version 1.9.7 or 1.8.11.
Yes, CVE-2025-1296 poses a risk of data leakage due to the exposure of sensitive tokens in audit logs.
Fixing CVE-2025-1296 is crucial to protect sensitive credentials and maintain the security integrity of your Nomad deployments.