github.com/hashicorp/vault known bugs
go106 known bugs in github.com/hashicorp/vault, with affected versions, fixes and workarounds. Sourced from upstream issue trackers.
106
bugs
Known bugs
| Severity | Affected | Fixed in | Title | Status | Source |
|---|---|---|---|---|---|
| high | any | 1.10.11 | Hashicorp Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation When using the Vault and Vault Enterprise (Vault) approle auth method, any authenticated user with access to the `/auth/approle/role/:role_name/secret-id-accessor/destroy` endpoint can destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability, CVE-2023-24999, has been fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above. | fixed | osv:GHSA-wmg5-g953-qqfw |
| high | 1.20.3 | 1.21.0 | Hashicorp Vault and Vault Enterprise vulnerable to a denial of service when processing JSON Vault and Vault Enterprise ("Vault") are vulnerable to an unauthenticated denial of service when processing JSON payloads. This occurs due to a regression from a previous fix for [+HCSEC-2025-24+|https://discuss.hashicorp.com/t/hcsec-2025-24-vault-denial-of-service-though-complex-json-payloads/76393] which allowed for processing JSON payloads before applying rate limits. This vulnerability, CVE-2025-12044, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.16.27, 1.19.11, 1.20.5, and 1.21.0. | fixed | osv:GHSA-vp5w-xcfc-73wf |
| high | any | 1.18.0 | Vault Community Edition privilege escalation vulnerability A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their privileges to Vault’s root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16 | fixed | osv:GHSA-rr8j-7w34-xp5j |
| high | 1.6.0 | 1.6.2 | Improper Authentication in HashiCorp Vault HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2. | fixed | osv:GHSA-rq95-xf66-j689 |
| high | 1.15.0 | 1.15.5 | Incorrect TLS certificate auth method in Vault Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious certificate that could be used to bypass authentication. Fixed in Vault 1.15.5 and 1.14.10. | fixed | osv:GHSA-r3w7-mfpm-c2vw |
| high | 0.10.0 | \u2014 | HashiCorp Vault has a KVv2 Metadata and Secret Deletion Policy Bypass that leads to Denial-of-Service An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delete secrets across namespaces, nor read any secret data. Fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16. | open | osv:GHSA-m2w4-8ggf-rj47 |
| high | 1.7.7 | 1.17.6 | Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15. | fixed | osv:GHSA-jg74-mwgw-v6x3 |
| high | 1.2.0 | 1.18.1 | Hashicorp Vault vulnerable to denial of service through memory exhaustion Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint. An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.
This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12. | fixed | osv:GHSA-g233-2p4r-3q7v |
| high | 0.8.1 | 1.2.5 | Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.. | fixed | osv:GHSA-fp52-qw33-mfmw |
| high | 0.11.0 | 1.3.2 | Improper Resource Shutdown or Release in HashiCorp Vault HashiCorp Vault Enterprise 0.11.0 through 1.3.1 fails, in certain circumstances, to revoke dynamic secrets for a mount in a deleted namespace. Fixed in 1.3.2. | fixed | osv:GHSA-9vh5-r4qw-v3vv |
| high | 0.6.0 | 1.21.0 | HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass Vault and Vault Enterprise's ("Vault") AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27. | fixed | osv:GHSA-9g4h-h484-3578 |
| high | any | 1.20.3 | HashiCorp Vault Community Edition Denial of Service Though Complex JSON Payloads A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25. | fixed | osv:GHSA-8f82-53h8-2p34 |
| high | any | \u2014 | HashiCorp Vault Vulnerable to Denial-of-Service via Unauthenticated Root Token Generation/Rekey Operations Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress operation slot. This prevents legitimate operators from completing these workflows. This vulnerability, CVE-2026-5807, is fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0. | open | osv:GHSA-88v5-9hxc-f85r |
| high | any | 1.13.0 | Hashicorp Vault Incorrect Permission Assignment for Critical Resource vulnerability The Vault and Vault Enterprise ("Vault") Google Cloud secrets engine did not preserve existing Google Cloud IAM Conditions upon creating or updating rolesets. Fixed in Vault 1.13.0. | fixed | osv:GHSA-86c6-3g63-5w64 |
| high | 0.11.2 | \u2014 | HashiCorp Vault May Expose Tokens to Auth Plugins Due to Incorrect Header Sanitization If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend. Fixed in 2.0.0, 1.21.5, 1.20.10, and 1.19.16. | open | osv:GHSA-72gw-fmmr-c4r4 |
| high | 1.15.0 | 1.15.4 | Memory exhaustion in HashiCorp Vault HashiCorp Vault and Vault Enterprise 1.12.0 and newer are vulnerable to a denial of service through memory exhaustion of the host when handling large unauthenticated and authenticated HTTP requests from a client. Vault will attempt to map the request to memory, resulting in the exhaustion of available memory on the host, which may cause Vault to crash.
Fixed in Vault 1.15.4, 1.14.8, 1.13.12. | fixed | osv:GHSA-6p62-6cg9-f5f5 |
| high | 0.10.4 | 1.20.0 | Hashicorp Vault has Privilege Escalation Vulnerability A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their own or another user’s token privileges to Vault’s root policy. Fixed in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11 and 1.16.22. | fixed | osv:GHSA-6h4p-m86h-hhgh |
| high | any | 1.13.10 | HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10. | fixed | osv:GHSA-4qhc-v8r6-8vwm |
| high | 0.8.3 | 1.2.5 | HashiCorp Vault Authentication bypass HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1. | fixed | osv:GHSA-4mp7-2m29-gqxf |
| high | 1.7.0 | 1.7.2 | Invalid session token expiration HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2. | fixed | osv:GHSA-38j9-7pp9-2hjw |
| high | 1.8.0 | \u2014 | Incorrect Privilege Assignment in HashiCorp Vault HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials. | open | osv:GHSA-362v-wg5p-64w2 |
| high | 1.10.0 | 1.15.12 | Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions Vault and Vault Enterprise did not properly handle requests originating from unauthorized IP addresses when the TCP listener option, proxy_protocol_behavior, was set to deny_unauthorized. When receiving a request from a source IP address that was not listed in proxy_protocol_authorized_addrs, the Vault API server would shut down and no longer respond to any HTTP requests, potentially resulting in denial of service.
While this bug also affected versions of Vault up to 1.17.1 and 1.16.5, a separate regression in those release series did not allow Vault operators to configure the deny_unauthorized option, thus not allowing the conditions for the denial of service to occur.
Fixed in Vault and Vault Enterprise 1.17.2, 1.16.6, and 1.15.12 | fixed | osv:GHSA-2qmw-pvf7-4mw6 |
| high | 1.3.0 | 1.3.6 | Information Disclosure in HashiCorp Vault HashiCorp Vault and Vault Enterprise before 1.3.6, and 1.4.2 before 1.4.2, insert Sensitive Information into a Log File. The vulnerability is affecting `github.com/hashicorp/vault/command` Go package. | fixed | osv:GHSA-25xj-89g5-fm6h |
| medium | 1.20.3 | 1.21.0 | Hashicorp Vault and Vault Enterprise vulnerable to a denial of service when processing JSON in github.com/hashicorp/vault Hashicorp Vault and Vault Enterprise vulnerable to a denial of service when processing JSON in github.com/hashicorp/vault | fixed | osv:GO-2025-4071 |
| medium | 0.6.0 | 1.21.0 | HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass in github.com/hashicorp/vault HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass in github.com/hashicorp/vault | fixed | osv:GO-2025-4070 |
| medium | any | 1.20.3 | HashiCorp Vault Community Edition Denial of Service Though Complex JSON Payloads in github.com/hashicorp/vault HashiCorp Vault Community Edition Denial of Service Though Complex JSON Payloads in github.com/hashicorp/vault | fixed | osv:GO-2025-3924 |
| medium | any | 1.20.2 | HashiCorp Vault ldap auth method may not have correctly enforced MFA in github.com/hashicorp/vault HashiCorp Vault ldap auth method may not have correctly enforced MFA in github.com/hashicorp/vault | fixed | osv:GO-2025-3848 |
| medium | 1.10.0 | 1.20.1 | Hashicorp Vault has Login MFA Rate Limit Bypass Vulnerability in github.com/hashicorp/vault Hashicorp Vault has Login MFA Rate Limit Bypass Vulnerability in github.com/hashicorp/vault | fixed | osv:GO-2025-3842 |
| medium | any | 1.20.1 | Hashicorp Vault's TOTP Secrets Engine Susceptible to Code Reuse in github.com/hashicorp/vault Hashicorp Vault's TOTP Secrets Engine Susceptible to Code Reuse in github.com/hashicorp/vault | fixed | osv:GO-2025-3841 |
| medium | 1.13.0 | 1.20.1 | Hashicorp Vault has Lockout Feature Authentication Bypass in github.com/hashicorp/vault Hashicorp Vault has Lockout Feature Authentication Bypass in github.com/hashicorp/vault | fixed | osv:GO-2025-3840 |
| medium | any | 1.20.1 | Hashicorp Vault has an Observable Discrepancy on Existing and Non-Existing Users in github.com/hashicorp/vault Hashicorp Vault has an Observable Discrepancy on Existing and Non-Existing Users in github.com/hashicorp/vault | fixed | osv:GO-2025-3839 |
| medium | 0.8.0 | 1.20.1 | Hashicorp Vault has Code Execution Vulnerability via Plugin Configuration in github.com/hashicorp/vault Hashicorp Vault has Code Execution Vulnerability via Plugin Configuration in github.com/hashicorp/vault | fixed | osv:GO-2025-3838 |
| medium | 0.10.4 | 1.20.0 | Hashicorp Vault has Privilege Escalation Vulnerability in github.com/hashicorp/vault Hashicorp Vault has Privilege Escalation Vulnerability in github.com/hashicorp/vault | fixed | osv:GO-2025-3837 |
| medium | any | 1.20.1 | Hashicorp Vault has Incorrect Validation for Non-CA Certificates in github.com/hashicorp/vault Hashicorp Vault has Incorrect Validation for Non-CA Certificates in github.com/hashicorp/vault | fixed | osv:GO-2025-3836 |
| medium | 1.14.8 | 1.20.0 | Vault Community Edition rekey and recovery key operations can cause denial of service in github.com/hashicorp/vault Vault Community Edition rekey and recovery key operations can cause denial of service in github.com/hashicorp/vault | fixed | osv:GO-2025-3788 |
| medium | 0.3.0 | 1.19.3 | Hashicorp Vault Community vulnerable to Generation of Error Message Containing Sensitive Information in github.com/hashicorp/vault Hashicorp Vault Community vulnerable to Generation of Error Message Containing Sensitive Information in github.com/hashicorp/vault | fixed | osv:GO-2025-3663 |
| medium | 1.10.0 | 1.19.1 | Hashicorp Vault Community vulnerable to Incorrect Authorization in github.com/hashicorp/vault Hashicorp Vault Community vulnerable to Incorrect Authorization in github.com/hashicorp/vault | fixed | osv:GO-2025-3662 |
| medium | 1.2.0 | 1.18.1 | Hashicorp Vault vulnerable to denial of service through memory exhaustion in github.com/hashicorp/vault Hashicorp Vault vulnerable to denial of service through memory exhaustion in github.com/hashicorp/vault | fixed | osv:GO-2024-3246 |
| medium | any | 1.18.0 | Vault Community Edition privilege escalation vulnerability in github.com/hashicorp/vault Vault Community Edition privilege escalation vulnerability in github.com/hashicorp/vault | fixed | osv:GO-2024-3191 |
| medium | 1.7.7 | 1.17.6 | Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault | fixed | osv:GO-2024-3162 |
| medium | 1.17.3 | 1.17.5 | Vault Leaks Client Token and Token Accessor in Audit Devices in github.com/hashicorp/vault Vault Leaks Client Token and Token Accessor in Audit Devices in github.com/hashicorp/vault | fixed | osv:GO-2024-3113 |
| medium | 1.17.0-rc1 | 1.17.2 | Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault.
NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.
(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)
The additional affected modules and versions are: github.com/hashicorp/vault before v1.15.12. | fixed | osv:GO-2024-2982 |
| medium | 1.17.0-rc1 | 1.17.0 | HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault.
NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.
(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)
The additional affected modules and versions are: github.com/hashicorp/vault before v1.15.9. | fixed | osv:GO-2024-2921 |
| medium | any | 1.16.0 | HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault | fixed | osv:GO-2024-2690 |
| medium | 1.15.0 | 1.15.5 | Authentication bypass in github.com/hashicorp/vault The TLS certificate authentication method incorrectly validates client certificates when configured with a non-CA certificate as a trusted certificate. When configured this way, attackers may be able to craft a certificate that can be used to bypass authentication. | fixed | osv:GO-2024-2617 |
| medium | 1.0.0 | 1.5.4 | Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault | fixed | osv:GO-2024-2514 |
| medium | 1.15.0 | 1.15.5 | Hashicorp Vault may expose sensitive log information in github.com/hashicorp/vault Hashicorp Vault may expose sensitive log information in github.com/hashicorp/vault | fixed | osv:GO-2024-2511 |
| medium | 1.6.0 | 1.6.2 | Improper Authentication in HashiCorp Vault in github.com/hashicorp/vault Improper Authentication in HashiCorp Vault in github.com/hashicorp/vault | fixed | osv:GO-2024-2509 |
| medium | 1.6.0 | 1.6.1 | Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault | fixed | osv:GO-2024-2508 |
| medium | 1.5.0 | 1.5.1 | HashiCorp Vault Authentication bypass in github.com/hashicorp/vault HashiCorp Vault Authentication bypass in github.com/hashicorp/vault | fixed | osv:GO-2024-2488 |
| medium | 0.9.0 | 1.3.4 | HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault | fixed | osv:GO-2024-2486 |
| medium | 0.11.0 | 1.3.4 | HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault | fixed | osv:GO-2024-2485 |
| medium | 1.15.0 | 1.15.4 | Denial of service via memory exhaustion in github.com/hashicorp/vault Unauthenticated and authenticated HTTP requests from a client will be attempted to be mapped to memory. Large requests may result in the exhaustion of available memory on the host, which may cause crashes and denial of service. | fixed | osv:GO-2023-2399 |
| medium | 1.15.0 | 1.15.2 | HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability in github.com/hashicorp/vault HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability in github.com/hashicorp/vault | fixed | osv:GO-2023-2329 |
| medium | any | 1.13.0 | Hashicorp Vault Incorrect Permission Assignment for Critical Resource vulnerability in github.com/hashicorp/vault Hashicorp Vault Incorrect Permission Assignment for Critical Resource vulnerability in github.com/hashicorp/vault | fixed | osv:GO-2023-2088 |
| medium | 1.14.0 | 1.14.3 | HashiCorp Vault Improper Input Validation vulnerability in github.com/hashicorp/vault HashiCorp Vault Improper Input Validation vulnerability in github.com/hashicorp/vault | fixed | osv:GO-2023-2063 |
| medium | 1.14.0 | 1.14.1 | HashiCorp Vault and Vault Enterprise vulnerable to user enumeration in github.com/hashicorp/vault HashiCorp Vault and Vault Enterprise vulnerable to user enumeration in github.com/hashicorp/vault | fixed | osv:GO-2023-1986 |
| medium | 1.12.0 | 1.12.4 | Hashicorp Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation in github.com/hashicorp/vault Hashicorp Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation in github.com/hashicorp/vault | fixed | osv:GO-2023-1900 |
| medium | 1.11.0 | 1.11.4 | HashiCorp Vault's revocation list not respected in github.com/hashicorp/vault HashiCorp Vault's revocation list not respected in github.com/hashicorp/vault | fixed | osv:GO-2023-1897 |
| medium | 1.13.0 | 1.13.3 | Hashicorp Vault vulnerable to Cross-site Scripting in github.com/hashicorp/vault Hashicorp Vault vulnerable to Cross-site Scripting in github.com/hashicorp/vault | fixed | osv:GO-2023-1849 |
| medium | 1.13.0 | 1.13.1 | Cache-timing attacks in Shamir's secret sharing in github.com/hashicorp/vault HashiCorp Vault's implementation of Shamir's secret sharing uses precomputed table lookups, and is vulnerable to cache-timing attacks.
An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. | fixed | osv:GO-2023-1709 |
| medium | 1.13.0 | 1.13.1 | HashiCorp Vault's PKI mount vulnerable to denial of service in github.com/hashicorp/vault HashiCorp Vault's PKI mount vulnerable to denial of service in github.com/hashicorp/vault | fixed | osv:GO-2023-1708 |
| medium | 1.13.0 | 1.13.1 | HashiCorp Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File in github.com/hashicorp/vault HashiCorp Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File in github.com/hashicorp/vault | fixed | osv:GO-2023-1685 |
| medium | 1.11.0 | 1.11.3 | HashiCorp Vault vulnerable to incorrect metadata access in github.com/hashicorp/vault HashiCorp Vault vulnerable to incorrect metadata access in github.com/hashicorp/vault | fixed | osv:GO-2022-1021 |
| medium | 1.5.0 | 1.5.1 | Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault in github.com/hashicorp/vault Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault in github.com/hashicorp/vault | fixed | osv:GO-2022-0825 |
| medium | 0.11.0 | 1.3.2 | Improper Resource Shutdown or Release in HashiCorp Vault in github.com/hashicorp/vault Improper Resource Shutdown or Release in HashiCorp Vault in github.com/hashicorp/vault | fixed | osv:GO-2022-0816 |
| medium | 1.4.0 | 1.4.2 | Information Disclosure in HashiCorp Vault in github.com/hashicorp/vault Information Disclosure in HashiCorp Vault in github.com/hashicorp/vault | fixed | osv:GO-2022-0778 |
| medium | 1.7.0 | 1.7.4 | Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault in github.com/hashicorp/vault Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault in github.com/hashicorp/vault | fixed | osv:GO-2022-0632 |
| medium | 1.7.0 | 1.7.2 | Invalid session token expiration in github.com/hashicorp/vault Invalid session token expiration in github.com/hashicorp/vault | fixed | osv:GO-2022-0623 |
| medium | 1.4.0 | 1.8.0 | HashiCorp Vault underlying database had excessively broad filesystem permissions from v1.4.0 until v1.8.0 in github.com/hashicorp/vault HashiCorp Vault underlying database had excessively broad filesystem permissions from v1.4.0 until v1.8.0 in github.com/hashicorp/vault | fixed | osv:GO-2022-0620 |
| medium | 1.8.0 | 1.8.4 | Hashicorp Vault Privilege Escalation Vulnerability in github.com/hashicorp/vault Hashicorp Vault Privilege Escalation Vulnerability in github.com/hashicorp/vault | fixed | osv:GO-2022-0618 |
| medium | 1.8.0 | 1.8.5 | HashiCorp Vault Incorrect Permission Assignment for Critical Resource in github.com/hashicorp/vault HashiCorp Vault Incorrect Permission Assignment for Critical Resource in github.com/hashicorp/vault | fixed | osv:GO-2022-0611 |
| medium | 1.10.0 | 1.10.3 | HashiCorp Vault improper configuration of multi factor authentication in github.com/hashicorp/vault HashiCorp Vault improper configuration of multi factor authentication in github.com/hashicorp/vault | fixed | osv:GO-2022-0590 |
| medium | 1.8.0 | 1.8.5 | Incorrect Privilege Assignment in HashiCorp Vault in github.com/hashicorp/vault Incorrect Privilege Assignment in HashiCorp Vault in github.com/hashicorp/vault | fixed | osv:GO-2022-0578 |
| medium | any | 1.11.9 | HashiCorp Vault's implementation of Shamir's secret sharing vulnerable to cache-timing attacks HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9. | fixed | osv:GHSA-vq4h-9ghm-qmrr |
| medium | 1.15.0 | 1.15.5 | Hashicorp Vault may expose sensitive log information Vault and Vault Enterprise (“Vault”) may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `log_raw` | fixed | osv:GHSA-vgh3-mwxq-rcp8 |
| medium | 1.6.0 | 1.12.11 | HashiCorp Vault Improper Input Validation vulnerability HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11. | fixed | osv:GHSA-v84f-6r39-cpfc |
| medium | 1.10.0 | 1.20.1 | Hashicorp Vault has Login MFA Rate Limit Bypass Vulnerability Vault and Vault Enterprise’s (“Vault”) login MFA rate limits could be bypassed and TOTP tokens could be reused. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23. | fixed | osv:GHSA-v6r4-35f9-9rpw |
| medium | 0.8.0 | 1.11.9 | HashiCorp Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File HashiCorp Vault and Vault Enterprise versions 0.8.0 until 1.13.1 are vulnerable to an SQL injection attack when using the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin, certain parameters are required to establish a connection (schema, database, and table) are not sanitized when passed to the user-provided MSSQL database. A privileged attacker with the ability to write arbitrary data to Vault's configuration may modify these parameters to execute a malicious SQL command when the Vault configuration is applied. This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9. | fixed | osv:GHSA-v3hp-mcj5-pg39 |
| medium | 1.5.0 | 1.5.6 | Enumeration of users in HashiCorp Vault HashiCorp Vault and Vault Enterprise allowed the enumeration of users via the LDAP auth method. Fixed in 1.5.6 and 1.6.1. | fixed | osv:GHSA-rpgp-9hmg-j25x |
| medium | any | 1.20.1 | Hashicorp Vault's TOTP Secrets Engine Susceptible to Code Reuse Vault and Vault Enterprise’s (“Vault”) TOTP Secrets Engine code validation endpoint is susceptible to code reuse within its validity period. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23. | fixed | osv:GHSA-qv3p-fmv3-9hww |
| medium | 1.13.0 | 1.20.1 | Hashicorp Vault has Lockout Feature Authentication Bypass Vault and Vault Enterprise’s (“Vault”) user lockout feature could be bypassed for Userpass and LDAP authentication methods. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23. | fixed | osv:GHSA-qgj7-fmq2-6cc4 |
| medium | 0.9.0 | 1.3.4 | HashiCorp Vault Improper Privilege Management HashiCorp Vault and Vault Enterprise versions 0.9.0 through 1.3.3 may, under certain circumstances, have an Entity's Group membership inadvertently include Groups the Entity no longer has permissions to. Fixed in 1.3.4. | fixed | osv:GHSA-m979-w9wj-qfj9 |
| medium | 1.17.3 | 1.17.5 | Vault Leaks Client Token and Token Accessor in Audit Devices Vault Community Edition and Vault Enterprise experienced a regression where functionality that HMAC’d sensitive headers in the configured audit device, specifically client tokens and token accessors, was removed. This resulted in the plaintext values of client tokens and token accessors being stored in the audit log. This vulnerability, CVE-2024-8365, was fixed in Vault Community Edition and Vault Enterprise 1.17.5 and Vault Enterprise 1.16.9. | fixed | osv:GHSA-jjxf-26c9-77gm |
| medium | any | 1.16.0 | HashiCorpVault does not correctly validate OCSP responses Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. Fixed in Vault 1.16.0 and Vault Enterprise 1.16.1, 1.15.7, and 1.14.11. | fixed | osv:GHSA-j2rp-gmqv-frhv |
| medium | any | 1.11.9 | HashiCorp Vault's PKI mount vulnerable to denial of service HashiCorp Vault's PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in denial of service of the PKI mount. This bug did not affect public or private key material, trust chains or certificate issuance. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9. | fixed | osv:GHSA-hwc3-3qh6-r4gg |
| medium | any | 1.11.11 | Hashicorp Vault vulnerable to Cross-site Scripting Vault and Vault Enterprise's (Vault) key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11. | fixed | osv:GHSA-gq98-53rq-qr5h |
| medium | 0.3.0 | 1.19.3 | Hashicorp Vault Community vulnerable to Generation of Error Message Containing Sensitive Information Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20. | fixed | osv:GHSA-gcqf-f89c-68hv |
| medium | 1.10.0 | 1.19.1 | Hashicorp Vault Community vulnerable to Incorrect Authorization Vault Community, Vault Enterprise (“Vault”) Azure Auth method did not correctly validate the claims in the Azure-issued token, resulting in the potential bypass of the bound_locations parameter on login. Fixed in Vault Community Edition 1.19.1 and Vault Enterprise 1.19.1, 1.18.7, 1.17.14, 1.16.18. | fixed | osv:GHSA-f9ch-h8j7-8jwg |
| medium | 1.10.0 | 1.10.3 | HashiCorp Vault improper configuration of multi factor authentication HashiCorp Vault and Vault Enterprise from 1.10.0 to 1.10.2 did not correctly configure and enforce MFA on login after server restarts. This affects the Login MFA feature introduced in Vault and Vault Enterprise 1.10.0 and does not affect the separate Enterprise MFA feature set. Fixed in 1.10.3. | fixed | osv:GHSA-c5wc-v287-82pc |
| medium | any | 1.13.5 | HashiCorp Vault and Vault Enterprise vulnerable to user enumeration HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5. | fixed | osv:GHSA-9v3w-w2jh-4hff |
| medium | 1.11.0 | 1.11.4 | HashiCorp Vault's revocation list not respected HashiCorp Vault and Vault Enterprise’s TLS certificate auth method did not initially load the optionally configured CRL issued by the role's CA into memory on startup, resulting in the revocation list not being checked if the CRL has not yet been retrieved. Fixed in 1.12.0, 1.11.4, 1.10.7, and 1.9.10. | fixed | osv:GHSA-9mh8-9j64-443f |
| medium | 1.14.0 | \u2014 | HashiCorp Vault has Server-Side Request Forgery in ACME Challenge Validation via Attacker-Controlled DNS Vault’s PKI engine’s ACME validation did not reject local targets when issuing http-01 and tls-alpn-01 challenges. This may lead to these requests being sent to local network targets, potentially leading to information disclosure. Fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16. | open | osv:GHSA-8r5m-3f66-qpr3 |
| medium | any | 1.20.2 | HashiCorp Vault ldap auth method may not have correctly enforced MFA Vault and Vault Enterprise’s (“Vault”) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24. | fixed | osv:GHSA-7rx2-769v-hrwf |
| medium | any | 1.20.1 | Hashicorp Vault has Incorrect Validation for Non-CA Certificates Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as [+trusted certificate+|https://developer.hashicorp.com/vault/api-docs/auth/cert#certificate]. In this configuration, an attacker may be able to craft a malicious certificate that could be used to impersonate another user. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23. | fixed | osv:GHSA-6c5r-4wfc-3mcx |
| medium | any | 1.6.6 | Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault HashiCorp Vault and Vault Enterprise’s UI erroneously cached and exposed user-viewed secrets between sessions in a single shared browser. Fixed in 1.8.0 and pending 1.7.4 / 1.6.6 releases. | fixed | osv:GHSA-6239-28c2-9mrm |
| low | any | 1.7.5 | Hashicorp Vault Privilege Escalation Vulnerability HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other user’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4. | fixed | osv:GHSA-qv95-g3gm-x542 |
| low | any | 1.20.1 | Hashicorp Vault has an Observable Discrepancy on Existing and Non-Existing Users A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23. | fixed | osv:GHSA-mwgr-84fv-3jh9 |
| low | 1.14.8 | 1.20.0 | Vault Community Edition rekey and recovery key operations can cause denial of service Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22. | fixed | osv:GHSA-fhc2-8qx8-6vj7 |
| low | 1.17.0-rc1 | 1.17.0 | HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected.
This vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9 | fixed | osv:GHSA-32cj-5wx4-gq8p |
| critical | 0.11.0 | 1.7.6 | HashiCorp Vault Incorrect Permission Assignment for Critical Resource HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0. | fixed | osv:GHSA-pfmw-vj74-ph8g |
| critical | 0.8.0 | 1.20.1 | Hashicorp Vault has Code Execution Vulnerability via Plugin Configuration A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault’s configuration. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23. | fixed | osv:GHSA-mr4h-qf9j-f665 |
| critical | 0.11.0 | 1.3.4 | HashiCorp Vault Improper Privilege Management HashiCorp Vault and Vault Enterprise versions 0.11.0 through 1.3.3 may, under certain circumstances, have existing nested-path policies grant access to Namespaces created after-the-fact. Fixed in 1.3.4. | fixed | osv:GHSA-j6vv-vv26-rh7c |
| critical | 1.11.0 | 1.11.3 | HashiCorp Vault vulnerable to incorrect metadata access An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault. | fixed | osv:GHSA-7cgv-v83v-rr87 |
| critical | 1.0.0-beta1 | 1.5.4 | Token leases could outlive their TTL in HashiCorp Vault HashiCorp Vault and Vault Enterprise 1.0 before 1.5.4 have Incorrect Access Control. | fixed | osv:GHSA-57gg-cj55-q5g2 |
| critical | 1.4.0 | 1.8.0 | HashiCorp Vault underlying database had excessively broad filesystem permissions from v1.4.0 until v1.8.0 HashiCorp Vault and Vault Enterprise 1.4.0 through 1.7.3 initialized an underlying database file associated with the Integrated Storage feature with excessively broad filesystem permissions. Fixed in Vault and Vault Enterprise 1.8.0. | fixed | osv:GHSA-23fq-q7hc-993r |
API access
Get this data programmatically \u2014 free, no authentication.
curl https://depscope.dev/api/bugs/go/github.com/hashicorp/vault