CVE-2026-44516: Valtimo Logs Sensitive Data Regardless of Debug Settings
The National Vulnerability Database (NVD) reports a high-severity vulnerability, CVE-2026-44516, in Valtimo, an open-source business process automation platform. Versions 12.4.0 through 12.33.0 and 13.26.0 are affected. The issue stems from the LoggingRestClientCustomizer in the web module, which indiscriminately intercepts and logs all outgoing HTTP request and response bodies, as well as response headers.
Critically, when an error response occurs, this sensitive information is embedded within HttpClientErrorException messages. These messages are then logged at an ERROR level by Spring’s default exception handling, completely bypassing the application’s configured DEBUG log level settings. This means production systems could be inadvertently logging highly sensitive data, including API keys, PII, or other confidential information, into standard error logs.
The NVD assigns a CVSSv3.1 score of 7.6 (High) to this vulnerability, categorized under CWE-532 (Inclusion of Sensitive Information in Log Files). Valtimo has addressed this flaw in versions 12.33.0 and 13.26.0. Organizations utilizing affected versions must prioritize patching to prevent the inadvertent exposure of critical business data.
What This Means For You
- If your organization uses Valtimo, immediately check your version. If you are running 12.4.0 to 12.33.0 or 13.26.0, patch to 12.33.0 or 13.26.0 without delay. This isn't just a theoretical risk; it's a direct data leakage vector. Audit your logs for any `HttpClientErrorException` messages that might contain sensitive request/response data. Assume compromise until proven otherwise and rotate any credentials or tokens that could have been logged.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-44516: Valtimo Sensitive Data Logging in HTTP Errors
title: CVE-2026-44516: Valtimo Sensitive Data Logging in HTTP Errors
id: scw-2026-05-14-ai-1
status: experimental
level: high
description: |
Detects outgoing HTTP requests from Valtimo (versions 12.4.0 to 12.33.0 and 13.26.0) that result in an error status code (5xx). The vulnerability causes sensitive data from request/response bodies and headers to be logged at the ERROR level, even when debug logging is disabled. This rule specifically looks for error responses from API endpoints, which are common targets for data exfiltration.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44516/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
sc-status|startswith:
- '5'
cs-uri|contains:
- '/api/v1'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44516 | Information Disclosure | Valtimo versions 12.4.0 to 12.33.0 (exclusive) and 13.0.0 to 13.26.0 (exclusive) |
| CVE-2026-44516 | Information Disclosure | Valtimo web module: LoggingRestClientCustomizer |
| CVE-2026-44516 | Information Disclosure | Automatic logging of full HTTP request body, response body, and response headers on error responses |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.