github.com/hashicorp/vault breaking changes
go185 curated breaking changes across major versions of github.com/hashicorp/vault. Use this as a migration checklist before bumping dependencies.
- 1.21.5 \u2192 2.0.0api
api/auth/gcp: Update go.opentelemetry.io/otel/sdk to fix CVE-2026-39883.
- 1.21.5 \u2192 2.0.0api
api/auth: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.21.5 \u2192 2.0.0behavior
http: Added configurable `max_token_header_size` listener option (default 8 KB) to bound the size of authentication token headers (`X-Vault-Token` and `Authorization: Bearer`), preventing a potential denial-of-service attack via oversized header contents. The stdlib-level `MaxHeaderBytes` backstop is also now set on the HTTP server. Set `max_token_header_size = -1` to disable the limit.
- 1.21.5 \u2192 2.0.0breaking
auth/alicloud: Update plugin to [v0.23.1](https://github.com/hashicorp/vault-plugin-auth-alicloud/releases/tag/v0.23.1)
- 1.21.5 \u2192 2.0.0breaking
ui: disable scarf analytics for ui builds
- 1.21.5 \u2192 2.0.0breaking
vault/sdk: Upgrade `cloudflare/circl` to v1.6.3 to resolve CVE-2026-1229
- 1.21.5 \u2192 2.0.0breaking
vault/sdk: Upgrade `go.opentelemetry.io/otel/sdk` to v1.40.0 to resolve GO-2026-4394
- 1.21.5 \u2192 2.0.0breaking
Update github.com/dvsekhvalnov/jose2go to fix security vulnerability CVE-2025-63811.
- 1.21.5 \u2192 2.0.0breaking
go: update to golang/x/crypto to v0.45.0 to resolve GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x, GO-2025-4134 and GO-2025-4135.
- 1.21.5 \u2192 2.0.0breaking
secrets/ldap (enterprise): Static roles will be migrated from a plugin-managed queue to the Vault Enterprise Rotation Manager system. Static role migration progress can be checked and managed through a new static-migration endpoint. See the [LDAP documentation](https://developer.hashicorp.com/vault/docs/secrets/ldap#static-role-migration-to-rotation-manager) for more details on this process.
- 1.21.5 \u2192 2.0.0breaking
sdk/helpers/docker: Migrate docker helpers from github.com/docker/docker to github.com/moby/moby. This was necessary as github.com/docker/docker is no longer maintained. Resolves GHSA-x744-4wpc-v9h2 and GHSA-pxq6-2prw-chj9.
- 1.21.5 \u2192 2.0.0breaking
Upgrade `cloudflare/circl` to v1.6.3 to resolve CVE-2026-1229
- 1.21.5 \u2192 2.0.0breaking
Upgrade `filippo.io/edwards25519` to v1.1.1 to resolve GO-2026-4503
- 1.21.5 \u2192 2.0.0breaking
auth/aws: fix an issue where a user may be able to bypass authentication to Vault due to incorrect caching of the AWS client
- 1.21.5 \u2192 2.0.0breaking
auth/cert: ensure that the certificate being renewed matches the certificate attached to the session.
- 1.21.5 \u2192 2.0.0breaking
core: Resolve GO-2026-4518 and GHSA-jqcq-xjh3-6g23 by upgrading to github.com/jackc/pgx/v5
- 1.21.5 \u2192 2.0.0breaking
core: Update github.com/aws/aws-sdk-go-v2/ to fix security vulnerability GHSA-xmrv-pmrh-hhx2.
- 1.21.5 \u2192 2.0.0breaking
core: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.21.5 \u2192 2.0.0breaking
core: Update github.com/hashicorp/go-getter to fix security vulnerability GHSA-92mm-2pjq-r785.
- 1.21.5 \u2192 2.0.0breaking
core: Update go.opentelemetry.io/otel/sdk to fix CVE-2026-39883.
- 1.21.5 \u2192 2.0.0breaking
core: reject URL-encoded paths that do not specify a canonical path
- 1.21.5 \u2192 2.0.0breaking
sdk: Resolve GO-2026-4518 and GHSA-jqcq-xjh3-6g23 by upgrading to github.com/jackc/pgx/v5
- 1.21.5 \u2192 2.0.0breaking
sdk: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.21.5 \u2192 2.0.0removed
audit: A new top-level key called `supplemental_audit_data` can now appear within audit entries of type "response" within the request and response data structures. These new fields can contain data that further describe the request/response data and are mainly used for non-JSON based requests and responses to help auditing. The `audit-non-hmac-request-keys` and `audit-non-hmac-response-keys` apply to keys within `supplemental_audit_data` to remove the HMAC of the field values if so desired.
- 1.21.5 \u2192 2.0.0removed
core: Correctly remove any Vault tokens from the Authorization header when this header is forwarded to plugin backends. The header will only be forwarded if "Authorization" is explicitly included in the list of passthrough request headers.
- 1.21.4 \u2192 1.21.5api
api/auth/gcp: Update go.opentelemetry.io/otel/sdk to fix CVE-2026-39883.
- 1.21.4 \u2192 1.21.5api
transit (enterprise): Add context parameter to datakeys and derived-keys endpoint, to allow derived key encryption of the DEKs.
- 1.21.4 \u2192 1.21.5api
api/auth: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.21.4 \u2192 1.21.5behavior
dockerfile: container will now run as vault user by default
- 1.21.4 \u2192 1.21.5breaking
secrets/pki: Add Freshest CRL extension (Delta CRL Distribution Points) to base CRLs
- 1.21.4 \u2192 1.21.5breaking
sdk/helpers/docker: Migrate docker helpers from github.com/docker/docker to github.com/moby/moby. This was necessary as github.com/docker/docker is no longer maintained. Resolves GHSA-x744-4wpc-v9h2 and GHSA-pxq6-2prw-chj9.
- 1.21.4 \u2192 1.21.5breaking
core: Resolve GO-2026-4518 and GHSA-jqcq-xjh3-6g23 by upgrading to github.com/jackc/pgx/v5
- 1.21.4 \u2192 1.21.5breaking
core: Update github.com/aws/aws-sdk-go-v2/ to fix security vulnerability GHSA-xmrv-pmrh-hhx2.
- 1.21.4 \u2192 1.21.5breaking
core: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.21.4 \u2192 1.21.5breaking
core: Update github.com/hashicorp/go-getter to fix security vulnerability GHSA-92mm-2pjq-r785.
- 1.21.4 \u2192 1.21.5breaking
core: Update go.opentelemetry.io/otel/sdk to fix CVE-2026-39883.
- 1.21.4 \u2192 1.21.5breaking
core: reject URL-encoded paths that do not specify a canonical path
- 1.21.4 \u2192 1.21.5breaking
sdk: Resolve GO-2026-4518 and GHSA-jqcq-xjh3-6g23 by upgrading to github.com/jackc/pgx/v5
- 1.21.4 \u2192 1.21.5breaking
sdk: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.21.4 \u2192 1.21.5breaking
core: Bump Go version to 1.25.9
- 1.21.4 \u2192 1.21.5breaking
core: Vault now rejects paths that are not canonical, such as paths containing double slashes (`path//to/resource`)
- 1.21.4 \u2192 1.21.5breaking
config/listener: logs warnings on invalid x-forwarded-for configurations.
- 1.21.4 \u2192 1.21.5breaking
events (enterprise): Forward event notifications from primary to secondary clusters
- 1.21.4 \u2192 1.21.5breaking
pki: Reject obviously unsafe validation targets during ACME HTTP-01 and TLS-ALPN-01 challenge verification
- 1.21.4 \u2192 1.21.5breaking
secrets/pki: Add ACME configuration fields challenge_permitted_ip_ranges and challenge_excluded_ip_ranges configuration to control which IP addresses are allowed or disallowed for challenge validation.
- 1.21.4 \u2192 1.21.5breaking
secrets/transit: Improve import errors for non-PKCS#8 keys to clearly require PKCS#8.
- 1.21.4 \u2192 1.21.5breaking
audit/file: The logic preventing setting of executable bits on audit devices was enforced at unseal instead of just at new audit device creation, causing an error at unseal if an existing audit device had exec permissions. The logic now warns and clears exec bits to prevent unseal errors.
- 1.21.4 \u2192 1.21.5breaking
auth/gcp: Fix intermittent context canceled failures for Workload Identity Federation (WIF) authentication
- 1.21.4 \u2192 1.21.5breaking
core (Enterprise): fix unaligned atomic panic in replication code on 32-bit platforms.
- 1.21.4 \u2192 1.21.5removed
core: Correctly remove any Vault tokens from the Authorization header when this header is forwarded to plugin backends. The header will only be forwarded if "Authorization" is explicitly included in the list of passthrough request headers.
- 1.20.9 \u2192 1.20.10api
api/auth/gcp: Update go.opentelemetry.io/otel/sdk to fix CVE-2026-39883.
- 1.20.9 \u2192 1.20.10api
api/auth: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.20.9 \u2192 1.20.10behavior
dockerfile: container will now run as vault user by default
- 1.20.9 \u2192 1.20.10breaking
sdk/helpers/docker: Migrate docker helpers from github.com/docker/docker to github.com/moby/moby. This was necessary as github.com/docker/docker is no longer maintained. Resolves GHSA-x744-4wpc-v9h2 and GHSA-pxq6-2prw-chj9.
- 1.20.9 \u2192 1.20.10breaking
core: Resolve GO-2026-4518 and GHSA-jqcq-xjh3-6g23 by upgrading to github.com/jackc/pgx/v5
- 1.20.9 \u2192 1.20.10breaking
core: Update github.com/aws/aws-sdk-go-v2/ to fix security vulnerability GHSA-xmrv-pmrh-hhx2.
- 1.20.9 \u2192 1.20.10breaking
core: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.20.9 \u2192 1.20.10breaking
identity: Repair the integrity of duplicate and/or dangling entity aliases.
- 1.20.9 \u2192 1.20.10breaking
core (Enterprise): fix unaligned atomic panic in replication code on 32-bit platforms.
- 1.20.9 \u2192 1.20.10breaking
core/managed-keys (enterprise): Fix a bug that prevented the max_parallel field of PKCS#11 managed keys from being updated.
- 1.20.9 \u2192 1.20.10breaking
events (enterprise): Fix missed events when multiple event clients specify the same namespace and event type filters and one client disconnects.
- 1.20.9 \u2192 1.20.10breaking
pki: Reject obviously unsafe validation targets during ACME HTTP-01 and TLS-ALPN-01 challenge verification
- 1.20.9 \u2192 1.20.10breaking
secrets/pki: Add ACME configuration fields challenge_permitted_ip_ranges and challenge_excluded_ip_ranges configuration to control which IP addresses are allowed or disallowed for challenge validation.
- 1.20.9 \u2192 1.20.10breaking
secrets/pki: Add Freshest CRL extension (Delta CRL Distribution Points) to base CRLs
- 1.20.9 \u2192 1.20.10breaking
audit/file: The logic preventing setting of executable bits on audit devices was enforced at unseal instead of just at new audit device creation, causing an error at unseal if an existing audit device had exec permissions. The logic now warns and clears exec bits to prevent unseal errors.
- 1.20.9 \u2192 1.20.10breaking
auth/gcp: Fix intermittent context canceled failures for Workload Identity Federation (WIF) authentication
- 1.20.9 \u2192 1.20.10breaking
core: Update github.com/hashicorp/go-getter to fix security vulnerability GHSA-92mm-2pjq-r785.
- 1.20.9 \u2192 1.20.10breaking
core: Update go.opentelemetry.io/otel/sdk to fix CVE-2026-39883.
- 1.20.9 \u2192 1.20.10breaking
core: reject URL-encoded paths that do not specify a canonical path
- 1.20.9 \u2192 1.20.10breaking
sdk: Resolve GO-2026-4518 and GHSA-jqcq-xjh3-6g23 by upgrading to github.com/jackc/pgx/v5
- 1.20.9 \u2192 1.20.10breaking
sdk: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.20.9 \u2192 1.20.10breaking
core: Bump Go version to 1.25.9
- 1.20.9 \u2192 1.20.10breaking
core: Vault now rejects paths that are not canonical, such as paths containing double slashes (`path//to/resource`)
- 1.20.9 \u2192 1.20.10breaking
config/listener: logs warnings on invalid x-forwarded-for configurations.
- 1.20.9 \u2192 1.20.10removed
core: Correctly remove any Vault tokens from the Authorization header when this header is forwarded to plugin backends. The header will only be forwarded if "Authorization" is explicitly included in the list of passthrough request headers.
- 1.20.0 \u2192 1.20.1api
openapi: Add OpenAPI support for secret recovery operations. [[GH-31331](https://github.com/hashicorp/vault/pull/31331)]
- 1.20.0 \u2192 1.20.1api
auth/scep (enterprise): enforce the token_bound_cidrs role parameter within SCEP roles
- 1.20.0 \u2192 1.20.1api
**Post-Quantum Cryptography Support**: Experimental support for PQC signatures with SLH-DSA in Transit.
- 1.20.0 \u2192 1.20.1api
ui: Fix capability checks for api resources with underscores to properly hide actions and dropdown items a user cannot perform [[GH-31271](https://github.com/hashicorp/vault/pull/31271)]
- 1.20.0 \u2192 1.20.1breaking
activity (enterprise): Fix `development_cluster` setting being overwritten on performance secondaries upon cluster reload. [[GH-31223](https://github.com/hashicorp/vault/pull/31223)]
- 1.20.0 \u2192 1.20.1breaking
audit: **breaking change** privileged vault operator may execute code on the underlying host (CVE-2025-6000). Vault will not unseal if the only configured file audit device has executable permissions (e.g., 0777, 0755). See recent [breaking change](https://developer.hashicorp.com/vault/docs/updates/important-changes#breaking-changes) docs for more details. [[GH-31211](https://github.com/hashicorp/vault/pull/31211),[HCSEC-2025-14](https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033)]
- 1.20.0 \u2192 1.20.1breaking
auth/userpass: timing side-channel in vault's userpass auth method (CVE-2025-6011)[HCSEC-2025-15](https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034)
- 1.20.0 \u2192 1.20.1breaking
core/login: vault userpass and ldap user lockout bypass (CVE-2025-6004). update alias lookahead to respect username case for LDAP and username/password. [[GH-31352](https://github.com/hashicorp/vault/pull/31352),[HCSEC-2025-16](https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035)]
- 1.20.0 \u2192 1.20.1breaking
secrets/totp: vault totp secrets engine code reuse (CVE-2025-6014) [[GH-31246](https://github.com/hashicorp/vault/pull/31246),[HCSEC-2025-17](https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036)]
- 1.20.0 \u2192 1.20.1breaking
auth/cert: vault certificate auth method did not validate common name for non-ca certificates (CVE-2025-6037). test non-CA cert equality on login matching instead of individual fields. [[GH-31210](https://github.com/hashicorp/vault/pull/31210),[HCSEC-2025-18](https://discuss.hashicorp.com/t/hcsec-2025-18-vault-certificate-auth-method-did-not-validate-common-name-for-non-ca-certificates/76037)]
- 1.20.0 \u2192 1.20.1breaking
core/mfa: vault login mfa bypass of rate limiting and totp token reuse (CVE-2025-6015) [[GH-31217](https://github.com/hashicorp/vault/pull/31297),[HCSEC-2025-19](https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038)]
- 1.20.0 \u2192 1.20.1breaking
Plugin Downloads (enterprise): add CLI `-download` option for plugin register (beta)
- 1.20.0 \u2192 1.20.1breaking
secrets/pki (enterprise): enable separately-configured logging for SCEP-enrollment.
- 1.20.0 \u2192 1.20.1breaking
secrets/pki: Add the digest OID when logging SCEP digest mismatch errors. [[GH-31232](https://github.com/hashicorp/vault/pull/31232)]
- 1.20.0 \u2192 1.20.1breaking
auto-reporting (enterprise): Clarify debug logs to accurately reflect when automated license utilization reporting is enabled or disabled, especially since manual reporting is always initialized.
- 1.20.0 \u2192 1.20.1breaking
core/seal (enterprise): Fix a bug that caused the seal rewrap process to abort in the presence of partially sealed entries.
- 1.20.0 \u2192 1.20.1breaking
kmip (enterprise): Fix a panic that can happen when a KMIP client makes a request before the Vault server has finished unsealing. [[GH-31266](https://github.com/hashicorp/vault/pull/31266)]
- 1.20.0 \u2192 1.20.1breaking
plugins: Fix panics that can occur when a plugin audits a request or response before the Vault server has finished unsealing. [[GH-31266](https://github.com/hashicorp/vault/pull/31266)]
- 1.20.0 \u2192 1.20.1breaking
product usage reporting (enterprise): Clarify debug logs to accurately reflect when anonymous product usage reporting is enabled or disabled, especially since manual reporting is always initialized.
- 1.20.0 \u2192 1.20.1breaking
replication (enterprise): Fix bug with mount invalidations consuming excessive memory.
- 1.20.0 \u2192 1.20.1breaking
secrets-sync (enterprise): Unsyncing secret-key granularity associations will no longer give a misleading error about a failed unsync operation that did indeed succeed.
- 1.20.0 \u2192 1.20.1breaking
secrets/gcp: Update to [email protected] to address more eventual consistency issues [[GH-31350](https://github.com/hashicorp/vault/pull/31350)]
- 1.20.0 \u2192 1.20.1breaking
ui: Fix kv v2 overview page from erroring if a user does not have access to the /subkeys endpoint and the policy check fails. [[GH-31136](https://github.com/hashicorp/vault/pull/31136)]
- 1.20.0 \u2192 1.20.1breaking
ui: Fix mutation of unwrapped data when keys contain underscores [[GH-31287](https://github.com/hashicorp/vault/pull/31287)]
- 1.20.0 \u2192 1.20.1deprecated
plugins: Clarify usage of sha256, command, and version for plugin registration of binary or artifact with API and CLI. Introduce new RegisterPluginDetailed and RegisterPluginWtihContextDetailed functions to API client to propagate response along with error, and mark RegisterPlugin and RegisterPluginWithContext as deprecated. [[GH-30811](https://github.com/hashicorp/vault/pull/30811)]
- 1.19.6 \u2192 1.19.7breaking
replication (enterprise): Fix bug with mount invalidations consuming excessive memory.
- 1.19.6 \u2192 1.19.7breaking
product usage reporting (enterprise): Clarify debug logs to accurately reflect when anonymous product usage reporting is enabled or disabled, especially since manual reporting is always initialized.
- 1.19.6 \u2192 1.19.7breaking
core/seal (enterprise): Fix a bug that caused the seal rewrap process to abort in the presence of partially sealed entries.
- 1.19.6 \u2192 1.19.7breaking
auth/cert: vault certificate auth method did not validate common name for non-ca certificates (CVE-2025-6037). test non-CA cert equality on login matching instead of individual fields. [[GH-31210](https://github.com/hashicorp/vault/pull/31210),[HCSEC-2025-18](https://discuss.hashicorp.com/t/hcsec-2025-18-vault-certificate-auth-method-did-not-validate-common-name-for-non-ca-certificates/76037)]
- 1.19.6 \u2192 1.19.7breaking
core/mfa: vault login mfa bypass of rate limiting and totp token reuse (CVE-2025-6015) [[GH-31217](https://github.com/hashicorp/vault/pull/31297),[HCSEC-2025-19](https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038)]
- 1.19.6 \u2192 1.19.7breaking
auto-reporting (enterprise): Clarify debug logs to accurately reflect when automated license utilization reporting is enabled or disabled, especially since manual reporting is always initialized.
- 1.19.6 \u2192 1.19.7breaking
kmip (enterprise): Fix a panic that can happen when a KMIP client makes a request before the Vault server has finished unsealing. [[GH-31266](https://github.com/hashicorp/vault/pull/31266)]
- 1.19.6 \u2192 1.19.7breaking
plugins: Fix panics that can occur when a plugin audits a request or response before the Vault server has finished unsealing. [[GH-31266](https://github.com/hashicorp/vault/pull/31266)]
- 1.19.6 \u2192 1.19.7breaking
secrets/gcp: Update to [email protected] to address more eventual consistency issues
- 1.19.6 \u2192 1.19.7breaking
secrets-sync (enterprise): Unsyncing secret-key granularity associations will no longer give a misleading error about a failed unsync operation that did indeed succeed.
- 1.19.6 \u2192 1.19.7breaking
audit: **breaking change** privileged vault operator may execute code on the underlying host (CVE-2025-6000). Vault will not unseal if the only configured file audit device has executable permissions (e.g., 0777, 0755). See recent [breaking change](https://developer.hashicorp.com/vault/docs/updates/important-changes#breaking-changes) docs for more details. [[GH-31211](https://github.com/hashicorp/vault/pull/31211),[HCSEC-2025-14](https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033)]
- 1.19.6 \u2192 1.19.7breaking
auth/userpass: timing side-channel in vault's userpass auth method (CVE-2025-6011)[HCSEC-2025-15](https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034)
- 1.19.6 \u2192 1.19.7breaking
core/login: vault userpass and ldap user lockout bypass (CVE-2025-6004). update alias lookahead to respect username case for LDAP and username/password. [[GH-31352](https://github.com/hashicorp/vault/pull/31352),[HCSEC-2025-16](https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035)]
- 1.19.6 \u2192 1.19.7breaking
secrets/totp: vault totp secrets engine code reuse (CVE-2025-6014) [[GH-31246](https://github.com/hashicorp/vault/pull/31246),[HCSEC-2025-17](https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036)]
- 1.19.15 \u2192 1.19.16api
api/auth/gcp: Update go.opentelemetry.io/otel/sdk to fix CVE-2026-39883.
- 1.19.15 \u2192 1.19.16api
api/auth: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.19.15 \u2192 1.19.16behavior
dockerfile: container will now run as vault user by default
- 1.19.15 \u2192 1.19.16behavior
ldap auth (enterprise): Fix root password rotation for Active Directory by implementing UTF-16LE encoding and schema-specific handling. Adds new 'schema' config field (defaults to 'openldap' for backward compatibility).
- 1.19.15 \u2192 1.19.16breaking
identity: Repair the integrity of duplicate and/or dangling entity aliases.
- 1.19.15 \u2192 1.19.16breaking
config/listener: logs warnings on invalid x-forwarded-for configurations.
- 1.19.15 \u2192 1.19.16breaking
sdk/helpers/docker: Migrate docker helpers from github.com/docker/docker to github.com/moby/moby. This was necessary as github.com/docker/docker is no longer maintained. Resolves GHSA-x744-4wpc-v9h2 and GHSA-pxq6-2prw-chj9.
- 1.19.15 \u2192 1.19.16breaking
core: Resolve GO-2026-4518 and GHSA-jqcq-xjh3-6g23 by upgrading to github.com/jackc/pgx/v5
- 1.19.15 \u2192 1.19.16breaking
core: Update github.com/aws/aws-sdk-go-v2/ to fix security vulnerability GHSA-xmrv-pmrh-hhx2.
- 1.19.15 \u2192 1.19.16breaking
core: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.19.15 \u2192 1.19.16breaking
core: Update github.com/hashicorp/go-getter to fix security vulnerability GHSA-92mm-2pjq-r785.
- 1.19.15 \u2192 1.19.16breaking
core: Update go.opentelemetry.io/otel/sdk to fix CVE-2026-39883.
- 1.19.15 \u2192 1.19.16breaking
core: reject URL-encoded paths that do not specify a canonical path
- 1.19.15 \u2192 1.19.16breaking
sdk: Resolve GO-2026-4518 and GHSA-jqcq-xjh3-6g23 by upgrading to github.com/jackc/pgx/v5
- 1.19.15 \u2192 1.19.16breaking
sdk: Update github.com/go-jose/go-jose to fix security vulnerability CVE-2026-34986 and GHSA-78h2-9frx-2jm8.
- 1.19.15 \u2192 1.19.16breaking
core: Bump Go version to 1.25.9
- 1.19.15 \u2192 1.19.16breaking
core: Vault now rejects paths that are not canonical, such as paths containing double slashes (`path//to/resource`)
- 1.19.15 \u2192 1.19.16breaking
pki: Reject obviously unsafe validation targets during ACME HTTP-01 and TLS-ALPN-01 challenge verification
- 1.19.15 \u2192 1.19.16breaking
secrets/pki: Add ACME configuration fields challenge_permitted_ip_ranges and challenge_excluded_ip_ranges configuration to control which IP addresses are allowed or disallowed for challenge validation.
- 1.19.15 \u2192 1.19.16breaking
audit/file: The logic preventing setting of executable bits on audit devices was enforced at unseal instead of just at new audit device creation, causing an error at unseal if an existing audit device had exec permissions. The logic now warns and clears exec bits to prevent unseal errors.
- 1.19.15 \u2192 1.19.16breaking
auth/gcp: Fix intermittent context canceled failures for Workload Identity Federation (WIF) authentication
- 1.19.15 \u2192 1.19.16breaking
core (Enterprise): fix unaligned atomic panic in replication code on 32-bit platforms.
- 1.19.15 \u2192 1.19.16breaking
core/managed-keys (enterprise): Fix a bug that prevented the max_parallel field of PKCS#11 managed keys from being updated.
- 1.19.15 \u2192 1.19.16breaking
events (enterprise): Fix missed events when multiple event clients specify the same namespace and event type filters and one client disconnects.
- 1.19.15 \u2192 1.19.16removed
core: Correctly remove any Vault tokens from the Authorization header when this header is forwarded to plugin backends. The header will only be forwarded if "Authorization" is explicitly included in the list of passthrough request headers.
- 1.18.11 \u2192 1.18.12breaking
plugins: Fix panics that can occur when a plugin audits a request or response before the Vault server has finished unsealing. [[GH-31266](https://github.com/hashicorp/vault/pull/31266)]
- 1.18.11 \u2192 1.18.12breaking
secrets-sync (enterprise): Unsyncing secret-key granularity associations will no longer give a misleading error about a failed unsync operation that did indeed succeed.
- 1.18.11 \u2192 1.18.12breaking
core/seal (enterprise): Fix a bug that caused the seal rewrap process to abort in the presence of partially sealed entries.
- 1.18.11 \u2192 1.18.12breaking
kmip (enterprise): Fix a panic that can happen when a KMIP client makes a request before the Vault server has finished unsealing. [[GH-31266](https://github.com/hashicorp/vault/pull/31266)]
- 1.18.11 \u2192 1.18.12breaking
replication (enterprise): Fix bug with mount invalidations consuming excessive memory.
- 1.18.11 \u2192 1.18.12breaking
audit: **breaking change** privileged vault operator may execute code on the underlying host (CVE-2025-6000). Vault will not unseal if the only configured file audit device has executable permissions (e.g., 0777, 0755). See recent [breaking change](https://developer.hashicorp.com/vault/docs/updates/important-changes#breaking-changes) docs for more details. [[GH-31211](https://github.com/hashicorp/vault/pull/31211),[HCSEC-2025-14](https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033)]
- 1.18.11 \u2192 1.18.12breaking
auth/userpass: timing side-channel in vault's userpass auth method (CVE-2025-6011)[HCSEC-2025-15](https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034)
- 1.18.11 \u2192 1.18.12breaking
core/login: vault userpass and ldap user lockout bypass (CVE-2025-6004). update alias lookahead to respect username case for LDAP and username/password. [[GH-31352](https://github.com/hashicorp/vault/pull/31352),[HCSEC-2025-16](https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035)]
- 1.18.11 \u2192 1.18.12breaking
secrets/totp: vault totp secrets engine code reuse (CVE-2025-6014) [[GH-31246](https://github.com/hashicorp/vault/pull/31246),[HCSEC-2025-17](https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036)]
- 1.18.11 \u2192 1.18.12breaking
auth/cert: vault certificate auth method did not validate common name for non-ca certificates (CVE-2025-6037). test non-CA cert equality on login matching instead of individual fields. [[GH-31210](https://github.com/hashicorp/vault/pull/31210),[HCSEC-2025-18](https://discuss.hashicorp.com/t/hcsec-2025-18-vault-certificate-auth-method-did-not-validate-common-name-for-non-ca-certificates/76037)]
- 1.18.11 \u2192 1.18.12breaking
core/mfa: vault login mfa bypass of rate limiting and totp token reuse (CVE-2025-6015) [[GH-31217](https://github.com/hashicorp/vault/pull/31297),[HCSEC-2025-19](https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038)]
- 1.16.31 \u2192 1.17.0api
api: Upgrade from github.com/go-jose/go-jose/v3 v3.0.3 to github.com/go-jose/go-jose/v4 v4.0.1. [[GH-26527](https://github.com/hashicorp/vault/pull/26527)]
- 1.16.31 \u2192 1.17.0breaking
auth/azure: Update plugin to v0.18.0 [[GH-27146](https://github.com/hashicorp/vault/pull/27146)]
- 1.16.31 \u2192 1.17.0breaking
auth/gcp: Update plugin to v0.18.0 [[GH-27140](https://github.com/hashicorp/vault/pull/27140)]
- 1.16.31 \u2192 1.17.0breaking
database/couchbase: Update plugin to v0.11.0 [[GH-27145](https://github.com/hashicorp/vault/pull/27145)]
- 1.16.31 \u2192 1.17.0breaking
database/elasticsearch: Update plugin to v0.15.0 [[GH-27136](https://github.com/hashicorp/vault/pull/27136)]
- 1.16.31 \u2192 1.17.0breaking
database/mongodbatlas: Update plugin to v0.12.0 [[GH-27143](https://github.com/hashicorp/vault/pull/27143)]
- 1.16.31 \u2192 1.17.0breaking
database/redis-elasticache: Update plugin to v0.4.0 [[GH-27139](https://github.com/hashicorp/vault/pull/27139)]
- 1.16.31 \u2192 1.17.0breaking
database/redis: Update plugin to v0.3.0 [[GH-27117](https://github.com/hashicorp/vault/pull/27117)]
- 1.16.31 \u2192 1.17.0breaking
database/snowflake: Update plugin to v0.11.0 [[GH-27132](https://github.com/hashicorp/vault/pull/27132)]
- 1.16.31 \u2192 1.17.0breaking
sdk: String templates now have a maximum size of 100,000 characters. [[GH-26110](https://github.com/hashicorp/vault/pull/26110)]
- 1.16.31 \u2192 1.17.0breaking
secrets/ad: Update plugin to v0.18.0 [[GH-27172](https://github.com/hashicorp/vault/pull/27172)]
- 1.16.31 \u2192 1.17.0breaking
secrets/alicloud: Update plugin to v0.17.0 [[GH-27134](https://github.com/hashicorp/vault/pull/27134)]
- 1.16.31 \u2192 1.17.0breaking
auth/cf: Update plugin to v0.17.0 [[GH-27161](https://github.com/hashicorp/vault/pull/27161)]
- 1.16.31 \u2192 1.17.0breaking
auth/alicloud: Update plugin to v0.18.0 [[GH-27133](https://github.com/hashicorp/vault/pull/27133)]
- 1.16.31 \u2192 1.17.0breaking
auth/jwt: Update plugin to v0.20.3 that resolves a security issue with validing JWTs [[GH-26890](https://github.com/hashicorp/vault/pull/26890), [HCSEC-2024-11](https://discuss.hashicorp.com/t/hcsec-2024-11-vault-incorrectly-validated-json-web-tokens-jwt-audience-claims/67770)]
- 1.16.31 \u2192 1.17.0breaking
audit: breaking change - Vault now allows audit logs to contain 'correlation-id' and 'x-correlation-id' headers when they
- 1.16.31 \u2192 1.17.0breaking
auth/jwt: Update plugin to v0.20.2 [[GH-26291](https://github.com/hashicorp/vault/pull/26291)]
- 1.16.31 \u2192 1.17.0breaking
auth/kerberos: Update plugin to v0.12.0 [[GH-27177](https://github.com/hashicorp/vault/pull/27177)]
- 1.16.31 \u2192 1.17.0breaking
auth/kubernetes: Update plugin to v0.19.0 [[GH-27186](https://github.com/hashicorp/vault/pull/27186)]
- 1.16.31 \u2192 1.17.0breaking
auth/oci: Update plugin to v0.16.0 [[GH-27142](https://github.com/hashicorp/vault/pull/27142)]
- 1.16.31 \u2192 1.17.0breaking
core (enterprise): Seal High Availability (HA) must be enabled by `enable_multiseal` in configuration.
- 1.16.31 \u2192 1.17.0breaking
core/identity: improve performance for secondary nodes receiving identity related updates through replication [[GH-27184](https://github.com/hashicorp/vault/pull/27184)]
- 1.16.31 \u2192 1.17.0breaking
core: Bump Go version to 1.22.4
- 1.16.31 \u2192 1.17.0breaking
core: return an additional "invalid token" error message in 403 response when the provided request token is expired,
- 1.16.31 \u2192 1.17.0removed
auth/centrify: Remove the deprecated Centrify auth method plugin [[GH-27130](https://github.com/hashicorp/vault/pull/27130)]
- 1.16.22 \u2192 1.16.23breaking
plugins: Fix panics that can occur when a plugin audits a request or response before the Vault server has finished unsealing. [[GH-31266](https://github.com/hashicorp/vault/pull/31266)]
- 1.16.22 \u2192 1.16.23breaking
secrets-sync (enterprise): Unsyncing secret-key granularity associations will no longer give a misleading error about a failed unsync operation that did indeed succeed.
- 1.16.22 \u2192 1.16.23breaking
audit: **breaking change** privileged vault operator may execute code on the underlying host (CVE-2025-6000). Vault will not unseal if the only configured file audit device has executable permissions (e.g., 0777, 0755). See recent [breaking change](https://developer.hashicorp.com/vault/docs/updates/important-changes#breaking-changes) docs for more details. [[GH-31211](https://github.com/hashicorp/vault/pull/31211),[HCSEC-2025-14](https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033)]
- 1.16.22 \u2192 1.16.23breaking
core/mfa: vault login mfa bypass of rate limiting and totp token reuse (CVE-2025-6015) [[GH-31217](https://github.com/hashicorp/vault/pull/31297),[HCSEC-2025-19](https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038)]
- 1.16.22 \u2192 1.16.23breaking
core/seal (enterprise): Fix a bug that caused the seal rewrap process to abort in the presence of partially sealed entries.
- 1.16.22 \u2192 1.16.23breaking
auth/userpass: timing side-channel in vault's userpass auth method (CVE-2025-6011)[HCSEC-2025-15](https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034)
- 1.16.22 \u2192 1.16.23breaking
core/login: vault userpass and ldap user lockout bypass (CVE-2025-6004). update alias lookahead to respect username case for LDAP and username/password. [[GH-31352](https://github.com/hashicorp/vault/pull/31352),[HCSEC-2025-16](https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035)]
- 1.16.22 \u2192 1.16.23breaking
secrets/totp: vault totp secrets engine code reuse (CVE-2025-6014) [[GH-31246](https://github.com/hashicorp/vault/pull/31246),[HCSEC-2025-17](https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036)]
- 1.16.22 \u2192 1.16.23breaking
kmip (enterprise): Fix a panic that can happen when a KMIP client makes a request before the Vault server has finished unsealing. [[GH-31266](https://github.com/hashicorp/vault/pull/31266)]
- 1.16.22 \u2192 1.16.23breaking
auth/cert: vault certificate auth method did not validate common name for non-ca certificates (CVE-2025-6037). test non-CA cert equality on login matching instead of individual fields. [[GH-31210](https://github.com/hashicorp/vault/pull/31210),[HCSEC-2025-18](https://discuss.hashicorp.com/t/hcsec-2025-18-vault-certificate-auth-method-did-not-validate-common-name-for-non-ca-certificates/76037)]
Get this data programmatically \u2014 free, no authentication.
curl https://depscope.dev/api/breaking/go/github.com/hashicorp/vault