We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-55003

OpenBao Login MFA Bypasses Rate Limiting and TOTP Token Reuse



Description

OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao's Login Multi-Factor Authentication (MFA) system allows enforcing MFA using Time-based One Time Password (TOTP). Due to normalization applied by the underlying TOTP library, codes were accepted which could contain whitespace; this whitespace could bypass internal rate limiting of the MFA method and allow reuse of existing MFA codes. This issue was fixed in version 2.3.2. To work around this, use of rate-limiting quotas can limit an attacker's ability to exploit this: https://openbao.org/api-docs/system/rate-limit-quotas/.

Reserved 2025-08-04 | Published 2025-08-09 | Updated 2025-08-09 | Assigner GitHub_M


MEDIUM: 5.7CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-307: Improper Restriction of Excessive Authentication Attempts

Product status

< 2.3.2
affected

References

github.com/...penbao/security/advisories/GHSA-rxp7-9q75-vj3p

github.com/...ommit/8340a6918f6c41d8f75b6c3845c376d9dc32ed19

discuss.hashicorp.com/...limiting-and-totp-token-reuse/76038

cve.org (CVE-2025-55003)

nvd.nist.gov (CVE-2025-55003)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-55003

Support options

Helpdesk Chat, Email, Knowledgebase