CVE-2025-67745
📋 TL;DR
MyHoard versions 1.0.1 through 1.2.x log backup information including encryption keys in certain cases, potentially exposing sensitive database backup encryption. This affects organizations using MyHoard for MySQL backup management who haven't updated to version 1.3.0 or implemented workarounds.
💻 Affected Systems
- MyHoard
📦 What is this software?
Myhoard by Aiven
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain access to encrypted MySQL backups and decrypt them using exposed keys, leading to full database compromise and data exfiltration.
Likely Case
Unauthorized users with log access can extract encryption keys and decrypt backup files, potentially exposing sensitive database contents.
If Mitigated
With proper log security and access controls, the exposed keys remain inaccessible to attackers, limiting potential damage.
🎯 Exploit Status
Exploitation requires access to MyHoard logs where backup information is recorded.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.0
Vendor Advisory: https://github.com/Aiven-Open/myhoard/security/advisories/GHSA-v42r-6hr9-4hcr
Restart Required: Yes
Instructions:
1. Stop MyHoard service. 2. Update to version 1.3.0 using package manager or manual installation. 3. Restart MyHoard service. 4. Verify logs no longer contain encryption keys.
🔧 Temporary Workarounds
Redirect logs to /dev/null
linuxPrevent logging of sensitive backup information by directing MyHoard logs to null device.
Configure MyHoard logging to output to /dev/null in your logging configuration
🧯 If You Can't Patch
- Implement strict access controls on MyHoard log files and directories
- Regularly audit and monitor log files for exposure of encryption keys
🔍 How to Verify
Check if Vulnerable:
Check MyHoard version and examine logs for backup operations containing encryption key strings.
Check Version:
myhoard --version
Verify Fix Applied:
After updating to 1.3.0, verify that backup operation logs no longer contain encryption key information.
📡 Detection & Monitoring
Log Indicators:
- Log entries containing 'encryption_key', 'backup_key', or similar strings in backup-related log messages
Network Indicators:
- Unusual access patterns to log files or backup storage locations
SIEM Query:
source="myhoard.log" AND ("encryption_key" OR "backup_key")