#VU114683 Improper Neutralization of Escape, Meta, or Control Sequences in tracing-subscriber - CVE-2025-58160
Published: September 2, 2025
Vulnerability identifier: #VU114683
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-58160
CWE-ID: CWE-150
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
tracing-subscriber
tracing-subscriber
Software vendor:
tokio-rs
tokio-rs
Description
The vulnerability allows a remote attacker to poison application logs.
The vulnerability exists due to improper validation of ANSI characters. A remote attacker can pass specially crafted input containing ANSI escape sequences and perform log poisoning.
Remediation
Install updates from vendor's website.