Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.7

Terraform for Linode logs sensitive data in debug logs

CVE-2026-27900 GHSA-5rc7-2jj6-mp64 GHSA-5rc7-2jj6-mp64
Summary

Old versions of the Terraform Provider for Linode log sensitive information like passwords and storage data in debug logs. This can happen if you've enabled debug logging, either locally or in a CI/CD pipeline. To stay safe, disable debug logging or set it to warn level, limit who can see the logs, and regularly clean up old logs to avoid exposing sensitive data.

What to do
  • Update github.com linode to version 3.9.0.
  • Update linode github.com/linode/terraform-provider-linode/v3 to version 3.9.0.
Affected software
VendorProductAffected versionsFix available
github.com linode <= 3.9.0 3.9.0
github.com linode <= 2.41.2
github.com linode <= 1.30.0
linode github.com/linode/terraform-provider-linode/v3 <= 3.9.0 3.9.0
linode github.com/linode/terraform-provider-linode/v2 <= 2.41.2
linode github.com/linode/terraform-provider-linode <= 1.30.0
terraform linode_provider <= 3.9.0
Original title
The Terraform Provider for Linode versions prior to v3.9.0 logged sensitive information including some passwords, StackScript content, and object storage data in debug logs without redaction. Provi...
Original description
The Terraform Provider for Linode versions prior to v3.9.0 logged sensitive information including some passwords, StackScript content, and object storage data in debug logs without redaction. Provider debug logging is not enabled by default. This issue is exposed when debug/provider logs are explicitly enabled (for example in local troubleshooting, CI/CD jobs, or centralized log collection). If enabled, sensitive values may be written to logs and then retained, shared, or exported beyond the original execution environment. An authenticated user with access to provider debug logs (through log aggregation systems, CI/CD pipelines, or debug output) would thus be able to extract these sensitive credentials. Versions 3.9.0 and later sanitize debug logs by logging only non-sensitive metadata such as labels, regions, and resource IDs while redacting credentials, tokens, keys, scripts, and other sensitive content. Some other mitigations and workarounds are available. Disable Terraform/provider debug logging or set it to `WARN` level or above, restrict access to existing and historical logs, purge/retention-trim logs that may contain sensitive values, and/or rotate potentially exposed secrets/credentials.
nvd CVSS3.1 5.0
Vulnerability type
CWE-532 Insertion of Sensitive Information into Log File
Published: 26 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026