github.com/hashicorp/consul known bugs
go64 known bugs in github.com/hashicorp/consul, with affected versions, fixes and workarounds. Sourced from upstream issue trackers.
64
bugs
Known bugs
| Severity | Affected | Fixed in | Title | Status | Source |
|---|---|---|---|---|---|
| high | 1.15.0 | 1.15.3 | Hashicorp Consul allows user with service:write permissions to patch remote proxy instances Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies. | fixed | osv:GHSA-rqjq-ww83-wv5c |
| high | 1.2.0 | 1.6.6 | Allocation of Resources Without Limits or Throttling in Hashicorp Consul HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/config
### Fix
The vulnerability is fixed in versions 1.6.6 and 1.7.4. | fixed | osv:GHSA-rqjq-mrgx-85hp |
| high | any | 1.4.4 | HashiCorp Consul vulnerable to Origin Validation Error HashiCorp Consul 1.4.3 lacks server hostname verification for agent-to-agent TLS communication. In other words, the product behaves as if `verify_server_hostname` were set to false, even when it is actually set to true. This is fixed in 1.4.4. | fixed | osv:GHSA-q7fx-wm2p-qfj8 |
| high | any | 1.9.17 | Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that HTTP health check endpoints returning an HTTP redirect may be abused as a vector for server-side request forgery (SSRF). This vulnerability, CVE-2022-29153, was fixed in Consul 1.9.17, 1.10.10, and 1.11.5. | fixed | osv:GHSA-q6h7-4qgw-2j9p |
| high | 1.8.1 | 1.11.9 | HashiCorp Consul does not properly validate node or segment names prior to usage in JWT claim assertions HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 did not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2. | fixed | osv:GHSA-hr3v-8cp3-68rf |
| high | 1.4.0 | 1.5.1 | HashiCorp Consul Incorrect Access Control vulnerability HashiCorp Consul 1.4.0 through 1.5.0 has Incorrect Access Control. Keys not matching a specific ACL rule used for prefix matching in a policy can be deleted by a token using that policy even with default deny settings configured.
### Specific Go Packages Affected
github.com/hashicorp/consul/acl | fixed | osv:GHSA-h65h-v7fw-4p38 |
| high | 1.13.0 | 1.14.0 | Missing Authorization in HashiCorp Consul HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0. | fixed | osv:GHSA-gw2g-hhc9-wgjh |
| high | 1.4.0 | 1.4.3 | HashiCorp Consul Access Restriction Bypass HashiCorp Consul (and Consul Enterprise) 1.4.x before 1.4.3 allows a client to bypass intended access restrictions and obtain the privileges of one other arbitrary token within secondary datacenters, because a token with literally "<hidden>" as its secret is used in unusual circumstances. | fixed | osv:GHSA-fhm8-cxcv-pwvc |
| high | 1.9.0 | 1.20.1 | Hashicorp Consul Path Traversal vulnerability A vulnerability was identified in Consul and Consul Enterprise ("Consul") such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules. | fixed | osv:GHSA-chgm-7r52-whjj |
| high | 1.10.1 | 1.10.2 | HashiCorp Consul Privilege Escalation Vulnerability HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2. | fixed | osv:GHSA-ccw8-7688-vqx4 |
| high | 1.16.0 | 1.16.1 | Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT Providers A vulnerability was identified in Consul such that using JWT authentication for service mesh incorrectly allows/denies access regardless of service identities. This vulnerability, CVE-2023-3518, affects Consul 1.16.0 and was fixed in 1.16.1. | fixed | osv:GHSA-9rhf-q362-77mx |
| high | any | 1.10.1 | HashiCorp Consul L7 deny intention results in an allow action In HashiCorp Consul before 1.10.1 (and Consul Enterprise), xds can generate a situation where a single L7 deny intention (with a default deny policy) results in an allow action. | fixed | osv:GHSA-8h2g-r292-j8xh |
| high | 1.7.0 | 1.7.9 | Denial of service in HashiCorp Consul HashiCorp Consul Enterprise versions 1.7.0 up to 1.7.8 and 1.8.0 up to 1.8.4 includes a namespace replication bug which can be triggered to cause denial of service via infinite Raft writes. Fixed in 1.7.9 and 1.8.5. | fixed | osv:GHSA-496g-fr33-whrf |
| high | any | 1.10.1 | Hashicorp Consul Missing SSL Certificate Validation HashiCorp Consul before 1.10.1 (and Consul Enterprise) has Missing SSL Certificate Validation. xds does not ensure that the Subject Alternative Name of an upstream is validated. | fixed | osv:GHSA-25gf-8qrr-g78r |
| high | any | 1.6.3 | Denial of Service (DoS) in HashiCorp Consul HashiCorp Consul and Consul Enterprise up to 1.6.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 1.6.3.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/consul | fixed | osv:GHSA-23jv-v6qj-3fhh |
| medium | any | 1.22.5 | Consul is vulnerable to arbitrary file read when configured with Kubernetes authentication in github.com/hashicorp/consul Consul is vulnerable to arbitrary file read when configured with Kubernetes authentication in github.com/hashicorp/consul | fixed | osv:GO-2026-4690 |
| medium | any | 1.22.0 | Consul event endpoint is vulnerable to denial of service in github.com/hashicorp/consul Consul event endpoint is vulnerable to denial of service in github.com/hashicorp/consul | fixed | osv:GO-2025-4082 |
| medium | any | 1.22.0 | Consul key/value endpoint is vulnerable to denial of service in github.com/hashicorp/consul Consul key/value endpoint is vulnerable to denial of service in github.com/hashicorp/consul | fixed | osv:GO-2025-4081 |
| medium | 1.9.0 | 1.20.1 | Hashicorp Consul Path Traversal vulnerability in github.com/hashicorp/consul Hashicorp Consul Path Traversal vulnerability in github.com/hashicorp/consul | fixed | osv:GO-2024-3243 |
| medium | 1.4.1 | 1.20.0 | Hashicorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul Hashicorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul | fixed | osv:GO-2024-3242 |
| medium | 1.9.0 | 1.20.1 | Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability in github.com/hashicorp/consul Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability in github.com/hashicorp/consul | fixed | osv:GO-2024-3241 |
| medium | 1.16.0 | 1.16.1 | Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT Providers in github.com/hashicorp/consul Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT Providers in github.com/hashicorp/consul | fixed | osv:GO-2024-2704 |
| medium | 1.13.0 | 1.13.2 | Improper handling of node names in JWT claims assertions in github.com/hashicorp/consul HashiCorp Consul does not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. | fixed | osv:GO-2024-2683 |
| medium | 1.8.0 | 1.8.6 | Privilege Escalation in HashiCorp Consul in github.com/hashicorp/consul Privilege Escalation in HashiCorp Consul in github.com/hashicorp/consul | fixed | osv:GO-2024-2505 |
| medium | 1.8.0 | 1.8.5 | Denial of service in HashiCorp Consul in github.com/hashicorp/consul Denial of service in HashiCorp Consul in github.com/hashicorp/consul | fixed | osv:GO-2024-2501 |
| medium | 1.4.0 | 1.4.3 | HashiCorp Consul Access Restriction Bypass in github.com/hashicorp/consul HashiCorp Consul Access Restriction Bypass in github.com/hashicorp/consul | fixed | osv:GO-2023-1945 |
| medium | any | 1.4.4 | HashiCorp Consul vulnerable to Origin Validation Error in github.com/hashicorp/consul HashiCorp Consul vulnerable to Origin Validation Error in github.com/hashicorp/consul | fixed | osv:GO-2023-1853 |
| medium | 1.4.0 | 1.5.1 | HashiCorp Consul Incorrect Access Control vulnerability in github.com/hashicorp/consul HashiCorp Consul Incorrect Access Control vulnerability in github.com/hashicorp/consul | fixed | osv:GO-2023-1852 |
| medium | 1.9.0 | 1.9.5 | HashiCorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul HashiCorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul | fixed | osv:GO-2023-1851 |
| medium | 0.5.1 | 1.4.1 | HashiCorp Consul can use cleartext agent-to-agent RPC communication in github.com/hashicorp/consul HashiCorp Consul can use cleartext agent-to-agent RPC communication in github.com/hashicorp/consul | fixed | osv:GO-2023-1850 |
| medium | 1.15.0 | 1.15.3 | Hashicorp Consul allows user with service:write permissions to patch remote proxy instances in github.com/hashicorp/consul Hashicorp Consul allows user with service:write permissions to patch remote proxy instances in github.com/hashicorp/consul | fixed | osv:GO-2023-1828 |
| medium | 1.15.0 | 1.15.3 | Hashicorp Consul vulnerable to denial of service in github.com/hashicorp/consul Hashicorp Consul vulnerable to denial of service in github.com/hashicorp/consul | fixed | osv:GO-2023-1827 |
| medium | 1.14.0 | 1.14.5 | Consul Server Panic when Ingress and API Gateways Configured with Peering Connections in github.com/hashicorp/consul Consul Server Panic when Ingress and API Gateways Configured with Peering Connections in github.com/hashicorp/consul | fixed | osv:GO-2023-1639 |
| medium | 1.13.0 | 1.14.0 | Missing Authorization in HashiCorp Consul in github.com/hashicorp/consul Missing Authorization in HashiCorp Consul in github.com/hashicorp/consul | fixed | osv:GO-2022-1121 |
| medium | 1.13.0 | 1.13.2 | HashiCorp Consul vulnerable to authorization bypass in github.com/hashicorp/consul HashiCorp Consul vulnerable to authorization bypass in github.com/hashicorp/consul | fixed | osv:GO-2022-1029 |
| medium | 1.11.0 | 1.11.3 | HashiCorp Consul Ingress Gateway Panic Can Shutdown Servers in github.com/hashicorp/consul HashiCorp Consul Ingress Gateway Panic Can Shutdown Servers in github.com/hashicorp/consul | fixed | osv:GO-2022-0953 |
| medium | any | 1.10.1 | HashiCorp Consul L7 deny intention results in an allow action in github.com/hashicorp/consul HashiCorp Consul L7 deny intention results in an allow action in github.com/hashicorp/consul | fixed | osv:GO-2022-0895 |
| medium | any | 1.10.1 | Hashicorp Consul Missing SSL Certificate Validation in github.com/hashicorp/consul Hashicorp Consul Missing SSL Certificate Validation in github.com/hashicorp/consul | fixed | osv:GO-2022-0894 |
| medium | 1.7.0 | 1.7.4 | Allocation of Resources Without Limits or Throttling in Hashicorp Consul in github.com/hashicorp/consul Allocation of Resources Without Limits or Throttling in Hashicorp Consul in github.com/hashicorp/consul | fixed | osv:GO-2022-0879 |
| medium | 1.4.1 | 1.6.3 | Incorrect Authorization in HashiCorp Consul in github.com/hashicorp/consul Incorrect Authorization in HashiCorp Consul in github.com/hashicorp/consul | fixed | osv:GO-2022-0874 |
| medium | 1.7.0 | 1.7.4 | Denial of Service (DoS) in HashiCorp Consul in github.com/hashicorp/consul Denial of Service (DoS) in HashiCorp Consul in github.com/hashicorp/consul | fixed | osv:GO-2022-0861 |
| medium | 1.7.0 | 1.7.4 | Improper Input Validation in HashiCorp Consul in github.com/hashicorp/consul Improper Input Validation in HashiCorp Consul in github.com/hashicorp/consul | fixed | osv:GO-2022-0859 |
| medium | 1.7.0 | 1.7.4 | Incorrect Permission Assignment for Critical Resource in Hashicorp Consul in github.com/hashicorp/consul Incorrect Permission Assignment for Critical Resource in Hashicorp Consul in github.com/hashicorp/consul | fixed | osv:GO-2022-0847 |
| medium | any | 1.6.3 | Denial of Service (DoS) in HashiCorp Consul in github.com/hashicorp/consul Denial of Service (DoS) in HashiCorp Consul in github.com/hashicorp/consul | fixed | osv:GO-2022-0776 |
| medium | 1.11.0 | 1.11.5 | Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector in github.com/hashicorp/consul Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector in github.com/hashicorp/consul | fixed | osv:GO-2022-0615 |
| medium | 1.10.1 | 1.10.2 | HashiCorp Consul Privilege Escalation Vulnerability in github.com/hashicorp/consul HashiCorp Consul Privilege Escalation Vulnerability in github.com/hashicorp/consul | fixed | osv:GO-2022-0593 |
| medium | 1.10.1 | 1.10.2 | HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. in github.com/hashicorp/consul HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. in github.com/hashicorp/consul | fixed | osv:GO-2022-0559 |
| medium | 1.14.0 | 1.14.5 | Consul Server Panic when Ingress and API Gateways Configured with Peering Connections A vulnerability was identified in Consul and Consul Enterprise (“Consul”) an authenticated user with service:write permissions could trigger a workflow that causes Consul server and client agents to crash under certain circumstances. To exploit this vulnerability, an attacker requires access to an ACL token with service:write permissions, and there needs to be at least one running ingress or API gateway that is configured to route traffic to an upstream service. | fixed | osv:GHSA-wj6x-hcc2-f32j |
| medium | 1.4.1 | 1.6.3 | Incorrect Authorization in HashiCorp Consul HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3. | fixed | osv:GHSA-r9w6-rhh9-7v53 |
| medium | any | 1.22.0 | Consul event endpoint is vulnerable to denial of service Consul and Consul Enterprise’s (“Consul”) event endpoint is vulnerable to denial of service (DoS) due to lack of maximum value on the Content Length header. This vulnerability, CVE-2025-11375, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12. | fixed | osv:GHSA-qh7p-pfq3-677h |
| medium | 1.6.0-beta1 | 1.6.6 | Denial of Service (DoS) in HashiCorp Consul HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/consul/discoverychain | fixed | osv:GHSA-q2qr-3c2p-9235 |
| medium | 1.6.0-beta1 | 1.6.6 | Improper Input Validation in HashiCorp Consul HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent | fixed | osv:GHSA-p2j5-3f4c-224r |
| medium | any | 1.11.9 | HashiCorp Consul vulnerable to authorization bypass HashiCorp Consul and Consul Enterprise versions prior to 1.11.9, 1.12.5, and 1.13.2 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. A specially crafted CSR sent directly to Consul’s internal server agent RPC endpoint can include multiple SAN URI values with additional service names. This issue has been fixed in versions 1.11.9, 1.12.5, and 1.13.2. There are no known workarounds. | fixed | osv:GHSA-m69r-9g56-7mv8 |
| medium | 1.6.0 | 1.6.6 | Incorrect Permission Assignment for Critical Resource in Hashicorp Consul HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/structs | fixed | osv:GHSA-hwqm-x785-qh8p |
| medium | 1.8.0 | 1.9.15 | HashiCorp Consul Ingress Gateway Panic Can Shutdown Servers HashiCorp Consul and Consul Enterprise 1.8.0 through 1.9.14, 1.10.7, and 1.11.2 has Uncontrolled Resource Consumption. Clusters with at least one ingress gateway configured may allow a user with `service:write` permission to register a specifically-defined service that can cause the Consul server to panic and shutdown. Versions 1.9.15, 1.10.8, and 1.11.3 contain patches for the problem. | fixed | osv:GHSA-hj93-5fg3-3chr |
| medium | any | 1.18.21 | Consul is vulnerable to arbitrary file read when configured with Kubernetes authentication HashiCorp Consul and Consul Enterprise 1.18.20 up to 1.21.10 and 1.22.4 are vulnerable to arbitrary file read when configured with Kubernetes authentication. This vulnerability, CVE-2026-2808, is fixed in Consul 1.18.21, 1.21.11 and 1.22.5. | fixed | osv:GHSA-cpfq-66p2-336j |
| medium | any | 1.14.5 | Hashicorp Consul vulnerable to denial of service Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3 | fixed | osv:GHSA-c57c-7hrj-6q6v |
| medium | 1.4.1 | 1.20.0 | Hashicorp Consul Cross-site Scripting vulnerability A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS. | fixed | osv:GHSA-99wr-c2px-grmh |
| medium | 1.9.0 | 1.9.5 | HashiCorp Consul Cross-site Scripting vulnerability HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14. | fixed | osv:GHSA-8xmx-h8rq-h94j |
| medium | any | 1.22.0 | Consul key/value endpoint is vulnerable to denial of service Consul and Consul Enterprise’s (“Consul”) key/value endpoint is vulnerable to denial of service (DoS) due to incorrect Content Length header validation. This vulnerability, CVE-2025-11374, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12. | fixed | osv:GHSA-7g3r-8c6v-hfmr |
| medium | 1.2.0 | 1.6.10 | Privilege Escalation in HashiCorp Consul HashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration. Fixed in 1.6.10, 1.7.10, and 1.8.6. | fixed | osv:GHSA-6m72-467w-94rh |
| medium | 1.10.1 | 1.10.2 | HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2. | fixed | osv:GHSA-6hw5-6gcx-phmw |
| medium | 1.9.0 | 1.20.1 | Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability A vulnerability was identified in Consul and Consul Enterprise ("Consul") such that using Headers in L7 traffic intentions could bypass HTTP header based access rules. | fixed | osv:GHSA-5c4w-8hhh-3c3h |
| medium | 0.5.1 | 1.4.1 | HashiCorp Consul can use cleartext agent-to-agent RPC communication HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the `verify_outgoing` setting is improperly documented. NOTE: the vendor has provided reconfiguration steps that do not require a software upgrade. | fixed | osv:GHSA-4qvx-qq5w-695p |
API access
Get this data programmatically \u2014 free, no authentication.
curl https://depscope.dev/api/bugs/go/github.com/hashicorp/consul