Home

Description

Vault and Vault Enterprise’s (“Vault”) AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27

PUBLISHED Reserved 2025-10-10 | Published 2025-10-23 | Updated 2025-10-24 | Assigner HashiCorp




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-288: Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unaffected

0.6.0 (semver) before 1.21.0
affected

Default status
unaffected

0.6.0 (semver) before 1.21.0
affected

References

discuss.hashicorp.com/...-mishandling-of-cache-entries/76709

cve.org (CVE-2025-11621)

nvd.nist.gov (CVE-2025-11621)

Download JSON