JWT Token Exposure in Log Download URL


Published: August 2025

Severity: Low

CVSS v3.1 Score: 3.1 (Low)

CWE: CWE-598: Use of GET Request Method With Sensitive Query Strings

Affected Versions: Webswing 22.2 through 23.2.20, and 24.1 through 25.1.3

Fixed In: 23.2.21 LTS, 25.1.4 LTS


Description

In affected Webswing versions, when an administrator downloads log files from the admin console, the request to /rest/logs/session/download includes a JWT token in the URL query string. This token is not the administrator’s session token, but a dedicated, short-lived (30 minutes) token with limited scope, allowing only the log download operation.

While the risk is limited, placing sensitive tokens in the URL may lead to unintentional exposure via browser history, reverse proxy logs, or referrer headers.


Impact

Anyone with access to logged URLs or browser history during the token’s validity window could potentially use the token to download log files. These logs may contain sensitive internal system information.


Resolution

This issue is resolved in:

  • 23.2.21 LTS
  • 25.1.4 LTS

In these versions, the token is now transmitted via the Authorization header instead of the URL, reducing exposure risk.


Recommendations

Customers running affected versions should upgrade to 23.2.21 or 25.1.4 as appropriate.

Customers with extended support contracts who require a fix for a different major version are encouraged to contact Webswing support.


Discoverer

Jean-Michel Huguet and Jorge Escabias from NATO Cyber Security Center