I wasn't able to find direct documentation on how to detect if CVE-2025-55182 was exploited on your instance or specific post-incident steps beyond updating.
Here's what the community discussion mentions:
What was potentially exposed: The RCE vulnerability allowed reading environment variables, including the SYSTEM_USER_PRIVATE_KEYSYSTEM_USER_PRIVATE_KEY used by the login UI for the IAM_LOGIN_CLIENTIAM_LOGIN_CLIENT role. (1)
**Suggested mitigations from community members**:
Turn off the V2 login feature flag so it uses the Go-based web template instead of the Next.js login
Enable MFA in external systems as an additional layer of protection
Consider rotating any keys that might have been exposed
**Detection**: One community member asked about checking audit logs for signs of exploitation, but no definitive answer was provided in the available sources.
For official guidance on detection, key rotation procedures, and comprehensive remediation steps, I'd recommend:
Clicking the "Ask for help" button to get a team member's input