Announcing Snyk CLI v1.1297.3 to address debug logging vulnerability CVE-2025-6624
We are releasing Snyk CLI v1.1297.3, a follow-up hotfix to our recent v1.1297.2 announcement. This update further enhances the security of debug logging.
We encourage all users to upgrade to v1.1297.3 to benefit from these important security enhancements. Release notes can be found here.
CVE-2025-6624 has been published to address this vulnerability.
Important: This hotfix resolves a potential vulnerability. Please review the details below.
By default, the Snyk CLI sanitizes sensitive credential information from logs. However, previous versions of the Snyk container CLI tool had potential vulnerabilities in this sanitization, where sensitive credentials could potentially be written into local Snyk CLI debug logs, if the Snyk CLI is executed in DEBUG or DEBUG/TRACE mode. There is no exposure to these vulnerabilities if the DEBUG flag is not used when executing Snyk CLI commands. Exact details are listed below.
Although these logs are only stored locally where the CLI is invoked, debug logs might have been manually sent as part of support queries to Snyk Support Engineers or copied/backed up to other locations by your processes.
Snyk has already proactively reached out to any customers we believe may have been exposed to this vulnerability, based on our internal usage logs. However, we recommend that users of Snyk CLI upgrade to this hotfix to avoid any future exposure.
This hotfix resolves the following vulnerabilities:
When the
snyk container test
orsnyk container monitor
commands are run against a container registry, with debug mode enabled, the container registry credentials could previously be written into the local Snyk CLI debug log in some circumstances. This only happens with credentials specified in environment variables (SNYK_REGISTRY_USERNAME
andSNYK_REGISTRY_PASSWORD
), or in the CLI (--password/-p
and--username/-u
).When the
snyk auth
command is executed with debug mode enabled AND the log level is set to TRACE, the access / refresh credential tokens used to connect the CLI to Snyk could previously be written into the local CLI debug logs.When the
snyk iac test
is executed with a Remote IAC Custom rules bundle, debug mode enabled AND the log level is set to TRACE, the docker registry token could previously be written into the local CLI debug logs.

Costin Busioc | Senior Product Manager