All the vulnerabilites related to openbao - openbao
cve-2025-54998
Vulnerability from cvelistv5
Published
2025-08-09 02:00
Modified
2025-08-11 14:38
Severity ?
EPSS score ?
Summary
OpenBao Userpass and LDAP User Lockout Bypass
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54998", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T14:38:13.223350Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T14:38:33.591Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003e= 0.1.0, \u003c 2.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, attackers could bypass the automatic user lockout mechanisms in the OpenBao Userpass or LDAP auth systems. This was caused by different aliasing between pre-flight and full login request user entity alias attributions. This is fixed in version 2.3.2. To work around this issue, existing users may apply rate-limiting quotas on the authentication endpoints:, see https://openbao.org/api-docs/system/rate-limit-quotas/." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-09T02:00:27.597Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-j3xv-7fxp-gfhx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-j3xv-7fxp-gfhx" }, { "name": "https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc" }, { "name": "https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035" } ], "source": { "advisory": "GHSA-j3xv-7fxp-gfhx", "discovery": "UNKNOWN" }, "title": "OpenBao Userpass and LDAP User Lockout Bypass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54998", "datePublished": "2025-08-09T02:00:27.597Z", "dateReserved": "2025-08-04T17:34:24.420Z", "dateUpdated": "2025-08-11T14:38:33.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-52893
Vulnerability from cvelistv5
Published
2025-06-25 16:54
Modified
2025-06-25 20:39
Severity ?
EPSS score ?
Summary
OpenBao May Leak Sensitive Information in Logs When Processing Malformed Data
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-52893", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-25T20:35:02.788748Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-25T20:39:04.734Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003c 2.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 may leak sensitive information in logs when processing malformed data. This is separate from the earlier HCSEC-2025-09 / CVE-2025-4166. This issue has been fixed in OpenBao v2.3.0 and later. Like with HCSEC-2025-09, there is no known workaround except to ensure properly formatted requests from all clients." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T16:54:50.262Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-8f5r-8cmq-7fmq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-8f5r-8cmq-7fmq" }, { "name": "https://github.com/go-viper/mapstructure/pull/105", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/go-viper/mapstructure/pull/105" }, { "name": "https://github.com/go-viper/mapstructure/commit/ed3f92181528ff776a0324107b8b55026e93766a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/go-viper/mapstructure/commit/ed3f92181528ff776a0324107b8b55026e93766a" }, { "name": "https://github.com/openbao/openbao/commit/cf5e920badbf96b41253534a3fd5ff5063bf4b30", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/commit/cf5e920badbf96b41253534a3fd5ff5063bf4b30" }, { "name": "https://discuss.hashicorp.com/t/hcsec-2025-09-vault-may-expose-sensitive-information-in-error-logs-when-processing-malformed-data-with-the-kv-v2-plugin/74717", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.hashicorp.com/t/hcsec-2025-09-vault-may-expose-sensitive-information-in-error-logs-when-processing-malformed-data-with-the-kv-v2-plugin/74717" }, { "name": "https://github.com/go-viper/mapstructure/releases/tag/v2.3.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/go-viper/mapstructure/releases/tag/v2.3.0" } ], "source": { "advisory": "GHSA-8f5r-8cmq-7fmq", "discovery": "UNKNOWN" }, "title": "OpenBao May Leak Sensitive Information in Logs When Processing Malformed Data" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-52893", "datePublished": "2025-06-25T16:54:50.262Z", "dateReserved": "2025-06-20T17:42:25.709Z", "dateUpdated": "2025-06-25T20:39:04.734Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-55001
Vulnerability from cvelistv5
Published
2025-08-09 02:01
Modified
2025-08-11 14:45
Severity ?
EPSS score ?
Summary
OpenBao LDAP MFA Enforcement Bypass When Using Username As Alias
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55001", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T14:45:22.660667Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T14:45:37.326Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003c 2.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao allowed the assignment of policies and MFA attribution based upon entity aliases, chosen by the underlying auth method. When the username_as_alias=true parameter in the LDAP auth method was in use, the caller-supplied username was used verbatim without normalization, allowing an attacker to bypass alias-specific MFA requirements. This issue was fixed in version 2.3.2. To work around this, remove all usage of the username_as_alias=true parameter and update any entity aliases accordingly." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-156", "description": "CWE-156: Improper Neutralization of Whitespace", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-09T02:01:29.056Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-2q8q-8fgw-9p6p", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-2q8q-8fgw-9p6p" }, { "name": "https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc" }, { "name": "https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092" } ], "source": { "advisory": "GHSA-2q8q-8fgw-9p6p", "discovery": "UNKNOWN" }, "title": "OpenBao LDAP MFA Enforcement Bypass When Using Username As Alias" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55001", "datePublished": "2025-08-09T02:01:29.056Z", "dateReserved": "2025-08-04T17:34:24.421Z", "dateUpdated": "2025-08-11T14:45:37.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-54999
Vulnerability from cvelistv5
Published
2025-08-09 02:00
Modified
2025-08-11 14:40
Severity ?
EPSS score ?
Summary
OpenBao: Timing Side-Channel in Userpass Auth Method
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54999", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T14:40:18.436808Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T14:40:29.456Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003e= 0.1.0, \u003c 2.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, when using OpenBao\u0027s userpass auth method, user enumeration was possible due to timing difference between non-existent users and users with stored credentials. This is independent of whether the supplied credentials were valid for the given user. This issue was fixed in version 2.3.2. To work around this issue, users may use another auth method or apply rate limiting quotas to limit the number of requests in a period of time: https://openbao.org/api-docs/system/rate-limit-quotas/." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203: Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-09T02:00:46.271Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-hh28-h22f-8357", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-hh28-h22f-8357" }, { "name": "https://github.com/openbao/openbao/commit/4d9b5d3d6486ab9fbd5b644173fa0097015d6626", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/commit/4d9b5d3d6486ab9fbd5b644173fa0097015d6626" }, { "name": "https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034" }, { "name": "https://discuss.hashicorp.com/t/hcsec-2025-21-vault-user-enumeration-in-userpass-auth-method/76095", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.hashicorp.com/t/hcsec-2025-21-vault-user-enumeration-in-userpass-auth-method/76095" } ], "source": { "advisory": "GHSA-hh28-h22f-8357", "discovery": "UNKNOWN" }, "title": "OpenBao: Timing Side-Channel in Userpass Auth Method" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54999", "datePublished": "2025-08-09T02:00:46.271Z", "dateReserved": "2025-08-04T17:34:24.421Z", "dateUpdated": "2025-08-11T14:40:29.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-54997
Vulnerability from cvelistv5
Published
2025-08-09 01:56
Modified
2025-08-11 13:56
Severity ?
EPSS score ?
Summary
OpenBao: Privileged Operator May Execute Code on the Underlying Host
References
▼ | URL | Tags |
---|---|---|
https://github.com/openbao/openbao/security/advisories/GHSA-xp75-r577-cvhp | x_refsource_CONFIRM | |
https://github.com/openbao/openbao/pull/1634 | x_refsource_MISC | |
https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033 | x_refsource_MISC | |
https://github.com/openbao/openbao/releases/tag/v2.3.2 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54997", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T13:56:31.277605Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T13:56:43.049Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003c 2.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, some OpenBao deployments intentionally limit privileged API operators from executing system code or making network connections. However, these operators can bypass both restrictions through the audit subsystem by manipulating log prefixes. This allows unauthorized code execution and network access that violates the intended security model. This issue is fixed in version 2.3.2. To workaround, users can block access to sys/audit/* endpoints using explicit deny policies, but root operators cannot be restricted this way." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-09T01:56:45.634Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-xp75-r577-cvhp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-xp75-r577-cvhp" }, { "name": "https://github.com/openbao/openbao/pull/1634", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/pull/1634" }, { "name": "https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033" }, { "name": "https://github.com/openbao/openbao/releases/tag/v2.3.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/releases/tag/v2.3.2" } ], "source": { "advisory": "GHSA-xp75-r577-cvhp", "discovery": "UNKNOWN" }, "title": "OpenBao: Privileged Operator May Execute Code on the Underlying Host" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54997", "datePublished": "2025-08-09T01:56:45.634Z", "dateReserved": "2025-08-04T17:34:24.420Z", "dateUpdated": "2025-08-11T13:56:43.049Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-54996
Vulnerability from cvelistv5
Published
2025-08-09 01:32
Modified
2025-08-11 13:53
Severity ?
EPSS score ?
Summary
OpenBao Root Namespace Operator May Elevate Token Privileges
References
▼ | URL | Tags |
---|---|---|
https://github.com/openbao/openbao/security/advisories/GHSA-vf84-mxrq-crqc | x_refsource_CONFIRM | |
https://github.com/openbao/openbao/pull/1627 | x_refsource_MISC | |
https://github.com/openbao/openbao/releases/tag/v2.3.2 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54996", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T13:53:29.919832Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T13:53:47.409Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003c 2.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, accounts with access to highly-privileged identity entity systems in root namespaces were able to increase their scope directly to the root policy. While the identity system allowed adding arbitrary policies, which in turn could contain capability grants on arbitrary paths, the root policy was restricted to manual generation using unseal or recovery key shares. The global root policy was not accessible from child namespaces. This issue is fixed in version 2.3.2. To workaround this vulnerability, use of denied_parameters in any policy which has access to the affected identity endpoints (on identity entities) may be sufficient to prohibit this type of attack." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-09T01:32:09.953Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-vf84-mxrq-crqc", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-vf84-mxrq-crqc" }, { "name": "https://github.com/openbao/openbao/pull/1627", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/pull/1627" }, { "name": "https://github.com/openbao/openbao/releases/tag/v2.3.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/releases/tag/v2.3.2" } ], "source": { "advisory": "GHSA-vf84-mxrq-crqc", "discovery": "UNKNOWN" }, "title": "OpenBao Root Namespace Operator May Elevate Token Privileges" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54996", "datePublished": "2025-08-09T01:32:09.953Z", "dateReserved": "2025-08-04T17:34:24.420Z", "dateUpdated": "2025-08-11T13:53:47.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-55003
Vulnerability from cvelistv5
Published
2025-08-09 02:01
Modified
2025-08-11 14:47
Severity ?
EPSS score ?
Summary
OpenBao Login MFA Bypasses Rate Limiting and TOTP Token Reuse
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55003", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T14:46:52.059573Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T14:47:04.206Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003c 2.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao\u0027s Login Multi-Factor Authentication (MFA) system allows enforcing MFA using Time-based One Time Password (TOTP). Due to normalization applied by the underlying TOTP library, codes were accepted which could contain whitespace; this whitespace could bypass internal rate limiting of the MFA method and allow reuse of existing MFA codes. This issue was fixed in version 2.3.2. To work around this, use of rate-limiting quotas can limit an attacker\u0027s ability to exploit this: https://openbao.org/api-docs/system/rate-limit-quotas/." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-09T02:01:43.985Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-rxp7-9q75-vj3p", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-rxp7-9q75-vj3p" }, { "name": "https://github.com/openbao/openbao/commit/8340a6918f6c41d8f75b6c3845c376d9dc32ed19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/commit/8340a6918f6c41d8f75b6c3845c376d9dc32ed19" }, { "name": "https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038" } ], "source": { "advisory": "GHSA-rxp7-9q75-vj3p", "discovery": "UNKNOWN" }, "title": "OpenBao Login MFA Bypasses Rate Limiting and TOTP Token Reuse" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55003", "datePublished": "2025-08-09T02:01:43.985Z", "dateReserved": "2025-08-04T17:34:24.421Z", "dateUpdated": "2025-08-11T14:47:04.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-55000
Vulnerability from cvelistv5
Published
2025-08-09 02:01
Modified
2025-08-11 14:43
Severity ?
EPSS score ?
Summary
OpenBao TOTP Secrets Engine Enables Code Reuse
References
▼ | URL | Tags |
---|---|---|
https://github.com/openbao/openbao/security/advisories/GHSA-f7c3-mhj2-9pvg | x_refsource_CONFIRM | |
https://github.com/openbao/openbao/commit/183891f8d535d5b6eb3d79fda8200cade6de99e1 | x_refsource_MISC | |
https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55000", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T14:42:51.463552Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-11T14:43:10.004Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003e= 0.1.0, \u003c 2.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, OpenBao\u0027s TOTP secrets engine could accept valid codes multiple times rather than strictly-once. This was caused by unexpected normalization in the underlying TOTP library. To work around, ensure that all codes are first normalized before submitting to the OpenBao endpoint. TOTP code verification is a privileged action; only trusted systems should be verifying codes." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-156", "description": "CWE-156: Improper Neutralization of Whitespace", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-09T02:01:16.409Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-f7c3-mhj2-9pvg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-f7c3-mhj2-9pvg" }, { "name": "https://github.com/openbao/openbao/commit/183891f8d535d5b6eb3d79fda8200cade6de99e1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/commit/183891f8d535d5b6eb3d79fda8200cade6de99e1" }, { "name": "https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036" } ], "source": { "advisory": "GHSA-f7c3-mhj2-9pvg", "discovery": "UNKNOWN" }, "title": "OpenBao TOTP Secrets Engine Enables Code Reuse" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55000", "datePublished": "2025-08-09T02:01:16.409Z", "dateReserved": "2025-08-04T17:34:24.421Z", "dateUpdated": "2025-08-11T14:43:10.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-52894
Vulnerability from cvelistv5
Published
2025-06-25 16:59
Modified
2025-06-25 20:24
Severity ?
EPSS score ?
Summary
OpenBao Vulnerable to Unauthenticated Rekey Operation Cancellation
References
▼ | URL | Tags |
---|---|---|
https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h | x_refsource_CONFIRM | |
https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b | x_refsource_MISC | |
https://openbao.org/docs/deprecation | x_refsource_MISC | |
https://openbao.org/docs/deprecation/unauthed-rekey | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-52894", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-25T20:23:37.656322Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-25T20:24:28.109Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openbao", "vendor": "openbao", "versions": [ { "status": "affected", "version": "\u003c 2.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T17:00:31.313Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h" }, { "name": "https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b" }, { "name": "https://openbao.org/docs/deprecation", "tags": [ "x_refsource_MISC" ], "url": "https://openbao.org/docs/deprecation" }, { "name": "https://openbao.org/docs/deprecation/unauthed-rekey", "tags": [ "x_refsource_MISC" ], "url": "https://openbao.org/docs/deprecation/unauthed-rekey" } ], "source": { "advisory": "GHSA-prpj-rchp-9j5h", "discovery": "UNKNOWN" }, "title": "OpenBao Vulnerable to Unauthenticated Rekey Operation Cancellation" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-52894", "datePublished": "2025-06-25T16:59:02.058Z", "dateReserved": "2025-06-20T17:42:25.709Z", "dateUpdated": "2025-06-25T20:24:28.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }