github.com/hashicorp/vault known bugs

go

106 known bugs in github.com/hashicorp/vault, with affected versions, fixes and workarounds. Sourced from upstream issue trackers.

106
bugs
Known bugs
SeverityAffectedFixed inTitleStatusSource
highany1.10.11
Hashicorp Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation
When using the Vault and Vault Enterprise (Vault) approle auth method, any authenticated user with access to the `/auth/approle/role/:role_name/secret-id-accessor/destroy` endpoint can destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability, CVE-2023-24999, has been fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above.
fixedosv:GHSA-wmg5-g953-qqfw
high1.20.31.21.0
Hashicorp Vault and Vault Enterprise vulnerable to a denial of service when processing JSON
Vault and Vault Enterprise ("Vault") are vulnerable to an unauthenticated denial of service when processing JSON payloads. This occurs due to a regression from a previous fix for [+HCSEC-2025-24+|https://discuss.hashicorp.com/t/hcsec-2025-24-vault-denial-of-service-though-complex-json-payloads/76393]  which allowed for processing JSON payloads before applying rate limits. This vulnerability, CVE-2025-12044, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.16.27, 1.19.11, 1.20.5, and 1.21.0.
fixedosv:GHSA-vp5w-xcfc-73wf
highany1.18.0
Vault Community Edition privilege escalation vulnerability
A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their privileges to Vault’s root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16
fixedosv:GHSA-rr8j-7w34-xp5j
high1.6.01.6.2
Improper Authentication in HashiCorp Vault
HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2.
fixedosv:GHSA-rq95-xf66-j689
high1.15.01.15.5
Incorrect TLS certificate auth method in Vault
Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious certificate that could be used to bypass authentication. Fixed in Vault 1.15.5 and 1.14.10.
fixedosv:GHSA-r3w7-mfpm-c2vw
high0.10.0\u2014
HashiCorp Vault has a KVv2 Metadata and Secret Deletion Policy Bypass that leads to Denial-of-Service
An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delete secrets across namespaces, nor read any secret data. Fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
openosv:GHSA-m2w4-8ggf-rj47
high1.7.71.17.6
Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default
Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.
fixedosv:GHSA-jg74-mwgw-v6x3
high1.2.01.18.1
Hashicorp Vault vulnerable to denial of service through memory exhaustion
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint. An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
fixedosv:GHSA-g233-2p4r-3q7v
high0.8.11.2.5
Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault
HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1..
fixedosv:GHSA-fp52-qw33-mfmw
high0.11.01.3.2
Improper Resource Shutdown or Release in HashiCorp Vault
HashiCorp Vault Enterprise 0.11.0 through 1.3.1 fails, in certain circumstances, to revoke dynamic secrets for a mount in a deleted namespace. Fixed in 1.3.2.
fixedosv:GHSA-9vh5-r4qw-v3vv
high0.6.01.21.0
HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass
Vault and Vault Enterprise's ("Vault") AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27.
fixedosv:GHSA-9g4h-h484-3578
highany1.20.3
HashiCorp Vault Community Edition Denial of Service Though Complex JSON Payloads
A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.
fixedosv:GHSA-8f82-53h8-2p34
highany\u2014
HashiCorp Vault Vulnerable to Denial-of-Service via Unauthenticated Root Token Generation/Rekey Operations
Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress operation slot. This prevents legitimate operators from completing these workflows. This vulnerability, CVE-2026-5807, is fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0.
openosv:GHSA-88v5-9hxc-f85r
highany1.13.0
Hashicorp Vault Incorrect Permission Assignment for Critical Resource vulnerability
The Vault and Vault Enterprise ("Vault") Google Cloud secrets engine did not preserve existing Google Cloud IAM Conditions upon creating or updating rolesets. Fixed in Vault 1.13.0.
fixedosv:GHSA-86c6-3g63-5w64
high0.11.2\u2014
HashiCorp Vault May Expose Tokens to Auth Plugins Due to Incorrect Header Sanitization
If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend. Fixed in 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
openosv:GHSA-72gw-fmmr-c4r4
high1.15.01.15.4
Memory exhaustion in HashiCorp Vault
HashiCorp Vault and Vault Enterprise 1.12.0 and newer are vulnerable to a denial of service through memory exhaustion of the host when handling large unauthenticated and authenticated HTTP requests from a client. Vault will attempt to map the request to memory, resulting in the exhaustion of available memory on the host, which may cause Vault to crash. Fixed in Vault 1.15.4, 1.14.8, 1.13.12.
fixedosv:GHSA-6p62-6cg9-f5f5
high0.10.41.20.0
Hashicorp Vault has Privilege Escalation Vulnerability
A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their own or another user’s token privileges to Vault’s root policy. Fixed in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11 and 1.16.22.
fixedosv:GHSA-6h4p-m86h-hhgh
highany1.13.10
HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability
HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.
fixedosv:GHSA-4qhc-v8r6-8vwm
high0.8.31.2.5
HashiCorp Vault Authentication bypass
HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.
fixedosv:GHSA-4mp7-2m29-gqxf
high1.7.01.7.2
Invalid session token expiration
HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.
fixedosv:GHSA-38j9-7pp9-2hjw
high1.8.0\u2014
Incorrect Privilege Assignment in HashiCorp Vault
HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials.
openosv:GHSA-362v-wg5p-64w2
high1.10.01.15.12
Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions
Vault and Vault Enterprise did not properly handle requests originating from unauthorized IP addresses when the TCP listener option, proxy_protocol_behavior, was set to deny_unauthorized. When receiving a request from a source IP address that was not listed in proxy_protocol_authorized_addrs, the Vault API server would shut down and no longer respond to any HTTP requests, potentially resulting in denial of service. While this bug also affected versions of Vault up to 1.17.1 and 1.16.5, a separate regression in those release series did not allow Vault operators to configure the deny_unauthorized option, thus not allowing the conditions for the denial of service to occur. Fixed in Vault and Vault Enterprise 1.17.2, 1.16.6, and 1.15.12
fixedosv:GHSA-2qmw-pvf7-4mw6
high1.3.01.3.6
Information Disclosure in HashiCorp Vault
HashiCorp Vault and Vault Enterprise before 1.3.6, and 1.4.2 before 1.4.2, insert Sensitive Information into a Log File. The vulnerability is affecting `github.com/hashicorp/vault/command` Go package.
fixedosv:GHSA-25xj-89g5-fm6h
medium1.20.31.21.0
Hashicorp Vault and Vault Enterprise vulnerable to a denial of service when processing JSON in github.com/hashicorp/vault
Hashicorp Vault and Vault Enterprise vulnerable to a denial of service when processing JSON in github.com/hashicorp/vault
fixedosv:GO-2025-4071
medium0.6.01.21.0
HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass in github.com/hashicorp/vault
HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass in github.com/hashicorp/vault
fixedosv:GO-2025-4070
mediumany1.20.3
HashiCorp Vault Community Edition Denial of Service Though Complex JSON Payloads in github.com/hashicorp/vault
HashiCorp Vault Community Edition Denial of Service Though Complex JSON Payloads in github.com/hashicorp/vault
fixedosv:GO-2025-3924
mediumany1.20.2
HashiCorp Vault ldap auth method may not have correctly enforced MFA in github.com/hashicorp/vault
HashiCorp Vault ldap auth method may not have correctly enforced MFA in github.com/hashicorp/vault
fixedosv:GO-2025-3848
medium1.10.01.20.1
Hashicorp Vault has Login MFA Rate Limit Bypass Vulnerability in github.com/hashicorp/vault
Hashicorp Vault has Login MFA Rate Limit Bypass Vulnerability in github.com/hashicorp/vault
fixedosv:GO-2025-3842
mediumany1.20.1
Hashicorp Vault's TOTP Secrets Engine Susceptible to Code Reuse in github.com/hashicorp/vault
Hashicorp Vault's TOTP Secrets Engine Susceptible to Code Reuse in github.com/hashicorp/vault
fixedosv:GO-2025-3841
medium1.13.01.20.1
Hashicorp Vault has Lockout Feature Authentication Bypass in github.com/hashicorp/vault
Hashicorp Vault has Lockout Feature Authentication Bypass in github.com/hashicorp/vault
fixedosv:GO-2025-3840
mediumany1.20.1
Hashicorp Vault has an Observable Discrepancy on Existing and Non-Existing Users in github.com/hashicorp/vault
Hashicorp Vault has an Observable Discrepancy on Existing and Non-Existing Users in github.com/hashicorp/vault
fixedosv:GO-2025-3839
medium0.8.01.20.1
Hashicorp Vault has Code Execution Vulnerability via Plugin Configuration in github.com/hashicorp/vault
Hashicorp Vault has Code Execution Vulnerability via Plugin Configuration in github.com/hashicorp/vault
fixedosv:GO-2025-3838
medium0.10.41.20.0
Hashicorp Vault has Privilege Escalation Vulnerability in github.com/hashicorp/vault
Hashicorp Vault has Privilege Escalation Vulnerability in github.com/hashicorp/vault
fixedosv:GO-2025-3837
mediumany1.20.1
Hashicorp Vault has Incorrect Validation for Non-CA Certificates in github.com/hashicorp/vault
Hashicorp Vault has Incorrect Validation for Non-CA Certificates in github.com/hashicorp/vault
fixedosv:GO-2025-3836
medium1.14.81.20.0
Vault Community Edition rekey and recovery key operations can cause denial of service in github.com/hashicorp/vault
Vault Community Edition rekey and recovery key operations can cause denial of service in github.com/hashicorp/vault
fixedosv:GO-2025-3788
medium0.3.01.19.3
Hashicorp Vault Community vulnerable to Generation of Error Message Containing Sensitive Information in github.com/hashicorp/vault
Hashicorp Vault Community vulnerable to Generation of Error Message Containing Sensitive Information in github.com/hashicorp/vault
fixedosv:GO-2025-3663
medium1.10.01.19.1
Hashicorp Vault Community vulnerable to Incorrect Authorization in github.com/hashicorp/vault
Hashicorp Vault Community vulnerable to Incorrect Authorization in github.com/hashicorp/vault
fixedosv:GO-2025-3662
medium1.2.01.18.1
Hashicorp Vault vulnerable to denial of service through memory exhaustion in github.com/hashicorp/vault
Hashicorp Vault vulnerable to denial of service through memory exhaustion in github.com/hashicorp/vault
fixedosv:GO-2024-3246
mediumany1.18.0
Vault Community Edition privilege escalation vulnerability in github.com/hashicorp/vault
Vault Community Edition privilege escalation vulnerability in github.com/hashicorp/vault
fixedosv:GO-2024-3191
medium1.7.71.17.6
Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault
Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault
fixedosv:GO-2024-3162
medium1.17.31.17.5
Vault Leaks Client Token and Token Accessor in Audit Devices in github.com/hashicorp/vault
Vault Leaks Client Token and Token Accessor in Audit Devices in github.com/hashicorp/vault
fixedosv:GO-2024-3113
medium1.17.0-rc11.17.2
Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault
Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/hashicorp/vault before v1.15.12.
fixedosv:GO-2024-2982
medium1.17.0-rc11.17.0
HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault
HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/hashicorp/vault before v1.15.9.
fixedosv:GO-2024-2921
mediumany1.16.0
HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault
HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault
fixedosv:GO-2024-2690
medium1.15.01.15.5
Authentication bypass in github.com/hashicorp/vault
The TLS certificate authentication method incorrectly validates client certificates when configured with a non-CA certificate as a trusted certificate. When configured this way, attackers may be able to craft a certificate that can be used to bypass authentication.
fixedosv:GO-2024-2617
medium1.0.01.5.4
Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault
Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault
fixedosv:GO-2024-2514
medium1.15.01.15.5
Hashicorp Vault may expose sensitive log information in github.com/hashicorp/vault
Hashicorp Vault may expose sensitive log information in github.com/hashicorp/vault
fixedosv:GO-2024-2511
medium1.6.01.6.2
Improper Authentication in HashiCorp Vault in github.com/hashicorp/vault
Improper Authentication in HashiCorp Vault in github.com/hashicorp/vault
fixedosv:GO-2024-2509
medium1.6.01.6.1
Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault
Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault
fixedosv:GO-2024-2508
medium1.5.01.5.1
HashiCorp Vault Authentication bypass in github.com/hashicorp/vault
HashiCorp Vault Authentication bypass in github.com/hashicorp/vault
fixedosv:GO-2024-2488
medium0.9.01.3.4
HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault
HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault
fixedosv:GO-2024-2486
medium0.11.01.3.4
HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault
HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault
fixedosv:GO-2024-2485
medium1.15.01.15.4
Denial of service via memory exhaustion in github.com/hashicorp/vault
Unauthenticated and authenticated HTTP requests from a client will be attempted to be mapped to memory. Large requests may result in the exhaustion of available memory on the host, which may cause crashes and denial of service.
fixedosv:GO-2023-2399
medium1.15.01.15.2
HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability in github.com/hashicorp/vault
HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability in github.com/hashicorp/vault
fixedosv:GO-2023-2329
mediumany1.13.0
Hashicorp Vault Incorrect Permission Assignment for Critical Resource vulnerability in github.com/hashicorp/vault
Hashicorp Vault Incorrect Permission Assignment for Critical Resource vulnerability in github.com/hashicorp/vault
fixedosv:GO-2023-2088
medium1.14.01.14.3
HashiCorp Vault Improper Input Validation vulnerability in github.com/hashicorp/vault
HashiCorp Vault Improper Input Validation vulnerability in github.com/hashicorp/vault
fixedosv:GO-2023-2063
medium1.14.01.14.1
HashiCorp Vault and Vault Enterprise vulnerable to user enumeration in github.com/hashicorp/vault
HashiCorp Vault and Vault Enterprise vulnerable to user enumeration in github.com/hashicorp/vault
fixedosv:GO-2023-1986
medium1.12.01.12.4
Hashicorp Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation in github.com/hashicorp/vault
Hashicorp Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation in github.com/hashicorp/vault
fixedosv:GO-2023-1900
medium1.11.01.11.4
HashiCorp Vault's revocation list not respected in github.com/hashicorp/vault
HashiCorp Vault's revocation list not respected in github.com/hashicorp/vault
fixedosv:GO-2023-1897
medium1.13.01.13.3
Hashicorp Vault vulnerable to Cross-site Scripting in github.com/hashicorp/vault
Hashicorp Vault vulnerable to Cross-site Scripting in github.com/hashicorp/vault
fixedosv:GO-2023-1849
medium1.13.01.13.1
Cache-timing attacks in Shamir's secret sharing in github.com/hashicorp/vault
HashiCorp Vault's implementation of Shamir's secret sharing uses precomputed table lookups, and is vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares.
fixedosv:GO-2023-1709
medium1.13.01.13.1
HashiCorp Vault's PKI mount vulnerable to denial of service in github.com/hashicorp/vault
HashiCorp Vault's PKI mount vulnerable to denial of service in github.com/hashicorp/vault
fixedosv:GO-2023-1708
medium1.13.01.13.1
HashiCorp Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File in github.com/hashicorp/vault
HashiCorp Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File in github.com/hashicorp/vault
fixedosv:GO-2023-1685
medium1.11.01.11.3
HashiCorp Vault vulnerable to incorrect metadata access in github.com/hashicorp/vault
HashiCorp Vault vulnerable to incorrect metadata access in github.com/hashicorp/vault
fixedosv:GO-2022-1021
medium1.5.01.5.1
Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault in github.com/hashicorp/vault
Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault in github.com/hashicorp/vault
fixedosv:GO-2022-0825
medium0.11.01.3.2
Improper Resource Shutdown or Release in HashiCorp Vault in github.com/hashicorp/vault
Improper Resource Shutdown or Release in HashiCorp Vault in github.com/hashicorp/vault
fixedosv:GO-2022-0816
medium1.4.01.4.2
Information Disclosure in HashiCorp Vault in github.com/hashicorp/vault
Information Disclosure in HashiCorp Vault in github.com/hashicorp/vault
fixedosv:GO-2022-0778
medium1.7.01.7.4
Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault in github.com/hashicorp/vault
Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault in github.com/hashicorp/vault
fixedosv:GO-2022-0632
medium1.7.01.7.2
Invalid session token expiration in github.com/hashicorp/vault
Invalid session token expiration in github.com/hashicorp/vault
fixedosv:GO-2022-0623
medium1.4.01.8.0
HashiCorp Vault underlying database had excessively broad filesystem permissions from v1.4.0 until v1.8.0 in github.com/hashicorp/vault
HashiCorp Vault underlying database had excessively broad filesystem permissions from v1.4.0 until v1.8.0 in github.com/hashicorp/vault
fixedosv:GO-2022-0620
medium1.8.01.8.4
Hashicorp Vault Privilege Escalation Vulnerability in github.com/hashicorp/vault
Hashicorp Vault Privilege Escalation Vulnerability in github.com/hashicorp/vault
fixedosv:GO-2022-0618
medium1.8.01.8.5
HashiCorp Vault Incorrect Permission Assignment for Critical Resource in github.com/hashicorp/vault
HashiCorp Vault Incorrect Permission Assignment for Critical Resource in github.com/hashicorp/vault
fixedosv:GO-2022-0611
medium1.10.01.10.3
HashiCorp Vault improper configuration of multi factor authentication in github.com/hashicorp/vault
HashiCorp Vault improper configuration of multi factor authentication in github.com/hashicorp/vault
fixedosv:GO-2022-0590
medium1.8.01.8.5
Incorrect Privilege Assignment in HashiCorp Vault in github.com/hashicorp/vault
Incorrect Privilege Assignment in HashiCorp Vault in github.com/hashicorp/vault
fixedosv:GO-2022-0578
mediumany1.11.9
HashiCorp Vault's implementation of Shamir's secret sharing vulnerable to cache-timing attacks
HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
fixedosv:GHSA-vq4h-9ghm-qmrr
medium1.15.01.15.5
Hashicorp Vault may expose sensitive log information
Vault and Vault Enterprise (“Vault”) may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `log_raw`
fixedosv:GHSA-vgh3-mwxq-rcp8
medium1.6.01.12.11
HashiCorp Vault Improper Input Validation vulnerability
HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11.
fixedosv:GHSA-v84f-6r39-cpfc
medium1.10.01.20.1
Hashicorp Vault has Login MFA Rate Limit Bypass Vulnerability
Vault and Vault Enterprise’s (“Vault”) login MFA rate limits could be bypassed and TOTP tokens could be reused. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
fixedosv:GHSA-v6r4-35f9-9rpw
medium0.8.01.11.9
HashiCorp Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File
HashiCorp Vault and Vault Enterprise versions 0.8.0 until 1.13.1 are vulnerable to an SQL injection attack when using the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin, certain parameters are required to establish a connection (schema, database, and table) are not sanitized when passed to the user-provided MSSQL database. A privileged attacker with the ability to write arbitrary data to Vault's configuration may modify these parameters to execute a malicious SQL command when the Vault configuration is applied. This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9.
fixedosv:GHSA-v3hp-mcj5-pg39
medium1.5.01.5.6
Enumeration of users in HashiCorp Vault
HashiCorp Vault and Vault Enterprise allowed the enumeration of users via the LDAP auth method. Fixed in 1.5.6 and 1.6.1.
fixedosv:GHSA-rpgp-9hmg-j25x
mediumany1.20.1
Hashicorp Vault's TOTP Secrets Engine Susceptible to Code Reuse
Vault and Vault Enterprise’s (“Vault”) TOTP Secrets Engine code validation endpoint is susceptible to code reuse within its validity period. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
fixedosv:GHSA-qv3p-fmv3-9hww
medium1.13.01.20.1
Hashicorp Vault has Lockout Feature Authentication Bypass
Vault and Vault Enterprise’s (“Vault”) user lockout feature could be bypassed for Userpass and LDAP authentication methods. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
fixedosv:GHSA-qgj7-fmq2-6cc4
medium0.9.01.3.4
HashiCorp Vault Improper Privilege Management
HashiCorp Vault and Vault Enterprise versions 0.9.0 through 1.3.3 may, under certain circumstances, have an Entity's Group membership inadvertently include Groups the Entity no longer has permissions to. Fixed in 1.3.4.
fixedosv:GHSA-m979-w9wj-qfj9
medium1.17.31.17.5
Vault Leaks Client Token and Token Accessor in Audit Devices
Vault Community Edition and Vault Enterprise experienced a regression where functionality that HMAC’d sensitive headers in the configured audit device, specifically client tokens and token accessors, was removed. This resulted in the plaintext values of client tokens and token accessors being stored in the audit log. This vulnerability, CVE-2024-8365, was fixed in Vault Community Edition and Vault Enterprise 1.17.5 and Vault Enterprise 1.16.9.
fixedosv:GHSA-jjxf-26c9-77gm
mediumany1.16.0
HashiCorpVault does not correctly validate OCSP responses
Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. Fixed in Vault 1.16.0 and Vault Enterprise 1.16.1, 1.15.7, and 1.14.11.
fixedosv:GHSA-j2rp-gmqv-frhv
mediumany1.11.9
HashiCorp Vault's PKI mount vulnerable to denial of service
HashiCorp Vault's PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in denial of service of the PKI mount. This bug did not affect public or private key material, trust chains or certificate issuance. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
fixedosv:GHSA-hwc3-3qh6-r4gg
mediumany1.11.11
Hashicorp Vault vulnerable to Cross-site Scripting
Vault and Vault Enterprise's (Vault) key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11.
fixedosv:GHSA-gq98-53rq-qr5h
medium0.3.01.19.3
Hashicorp Vault Community vulnerable to Generation of Error Message Containing Sensitive Information
Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20.
fixedosv:GHSA-gcqf-f89c-68hv
medium1.10.01.19.1
Hashicorp Vault Community vulnerable to Incorrect Authorization
Vault Community, Vault Enterprise (“Vault”) Azure Auth method did not correctly validate the claims in the Azure-issued token, resulting in the potential bypass of the bound_locations parameter on login. Fixed in Vault Community Edition 1.19.1 and Vault Enterprise 1.19.1, 1.18.7, 1.17.14, 1.16.18.
fixedosv:GHSA-f9ch-h8j7-8jwg
medium1.10.01.10.3
HashiCorp Vault improper configuration of multi factor authentication
HashiCorp Vault and Vault Enterprise from 1.10.0 to 1.10.2 did not correctly configure and enforce MFA on login after server restarts. This affects the Login MFA feature introduced in Vault and Vault Enterprise 1.10.0 and does not affect the separate Enterprise MFA feature set. Fixed in 1.10.3.
fixedosv:GHSA-c5wc-v287-82pc
mediumany1.13.5
HashiCorp Vault and Vault Enterprise vulnerable to user enumeration
HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.
fixedosv:GHSA-9v3w-w2jh-4hff
medium1.11.01.11.4
HashiCorp Vault's revocation list not respected
HashiCorp Vault and Vault Enterprise’s TLS certificate auth method did not initially load the optionally configured CRL issued by the role's CA into memory on startup, resulting in the revocation list not being checked if the CRL has not yet been retrieved. Fixed in 1.12.0, 1.11.4, 1.10.7, and 1.9.10.
fixedosv:GHSA-9mh8-9j64-443f
medium1.14.0\u2014
HashiCorp Vault has Server-Side Request Forgery in ACME Challenge Validation via Attacker-Controlled DNS
Vault’s PKI engine’s ACME validation did not reject local targets when issuing http-01 and tls-alpn-01 challenges. This may lead to these requests being sent to local network targets, potentially leading to information disclosure. Fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
openosv:GHSA-8r5m-3f66-qpr3
mediumany1.20.2
HashiCorp Vault ldap auth method may not have correctly enforced MFA
Vault and Vault Enterprise’s (“Vault”) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.
fixedosv:GHSA-7rx2-769v-hrwf
mediumany1.20.1
Hashicorp Vault has Incorrect Validation for Non-CA Certificates
Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as [+trusted certificate+|https://developer.hashicorp.com/vault/api-docs/auth/cert#certificate]. In this configuration, an attacker may be able to craft a malicious certificate that could be used to impersonate another user. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
fixedosv:GHSA-6c5r-4wfc-3mcx
mediumany1.6.6
Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault
HashiCorp Vault and Vault Enterprise’s UI erroneously cached and exposed user-viewed secrets between sessions in a single shared browser. Fixed in 1.8.0 and pending 1.7.4 / 1.6.6 releases.
fixedosv:GHSA-6239-28c2-9mrm
lowany1.7.5
Hashicorp Vault Privilege Escalation Vulnerability
HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other user’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4.
fixedosv:GHSA-qv95-g3gm-x542
lowany1.20.1
Hashicorp Vault has an Observable Discrepancy on Existing and Non-Existing Users
A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
fixedosv:GHSA-mwgr-84fv-3jh9
low1.14.81.20.0
Vault Community Edition rekey and recovery key operations can cause denial of service
Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22.
fixedosv:GHSA-fhc2-8qx8-6vj7
low1.17.0-rc11.17.0
HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims
Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected. This vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9
fixedosv:GHSA-32cj-5wx4-gq8p
critical0.11.01.7.6
HashiCorp Vault Incorrect Permission Assignment for Critical Resource
HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.
fixedosv:GHSA-pfmw-vj74-ph8g
critical0.8.01.20.1
Hashicorp Vault has Code Execution Vulnerability via Plugin Configuration
A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault’s configuration. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
fixedosv:GHSA-mr4h-qf9j-f665
critical0.11.01.3.4
HashiCorp Vault Improper Privilege Management
HashiCorp Vault and Vault Enterprise versions 0.11.0 through 1.3.3 may, under certain circumstances, have existing nested-path policies grant access to Namespaces created after-the-fact. Fixed in 1.3.4.
fixedosv:GHSA-j6vv-vv26-rh7c
critical1.11.01.11.3
HashiCorp Vault vulnerable to incorrect metadata access
An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault.
fixedosv:GHSA-7cgv-v83v-rr87
critical1.0.0-beta11.5.4
Token leases could outlive their TTL in HashiCorp Vault
HashiCorp Vault and Vault Enterprise 1.0 before 1.5.4 have Incorrect Access Control.
fixedosv:GHSA-57gg-cj55-q5g2
critical1.4.01.8.0
HashiCorp Vault underlying database had excessively broad filesystem permissions from v1.4.0 until v1.8.0
HashiCorp Vault and Vault Enterprise 1.4.0 through 1.7.3 initialized an underlying database file associated with the Integrated Storage feature with excessively broad filesystem permissions. Fixed in Vault and Vault Enterprise 1.8.0.
fixedosv:GHSA-23fq-q7hc-993r
API access

Get this data programmatically \u2014 free, no authentication.

curl https://depscope.dev/api/bugs/go/github.com/hashicorp/vault
github.com/hashicorp/vault bugs — known issues per version | DepScope | DepScope