We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52894

OpenBao Vulnerable to Unauthenticated Rekey Operation Cancellation



Description

OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao's website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.

Reserved 2025-06-20 | Published 2025-06-25 | Updated 2025-06-25 | Assigner GitHub_M


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-20: Improper Input Validation

Product status

< 2.3.0
affected

References

github.com/...penbao/security/advisories/GHSA-prpj-rchp-9j5h

github.com/...ommit/fe75468822a22a88318c6079425357a02ae5b77b

openbao.org/docs/deprecation

openbao.org/docs/deprecation/unauthed-rekey

cve.org (CVE-2025-52894)

nvd.nist.gov (CVE-2025-52894)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52894

Support options

Helpdesk Chat, Email, Knowledgebase