Home

Description

An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delete secrets across namespaces, nor read any secret data. Fxed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

PUBLISHED Reserved 2026-03-05 | Published 2026-04-17 | Updated 2026-04-17 | Assigner HashiCorp




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-288: Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unaffected

0.10.0 (semver) before 2.0.0
affected

Default status
unaffected

0.10.0 (semver) before 2.0.0
affected

References

discuss.hashicorp.com/...licy-bypass-denial-of-service/77342

cve.org (CVE-2026-3605)

nvd.nist.gov (CVE-2026-3605)

Download JSON