8.1

CVE-2025-11621

Vault AWS auth method bypass due to AWS client cache

Vault and Vault Enterprise’s (“Vault”) AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
HashicorpVault SwEditionenterprise Version >= 0.6.0 < 1.16.27
HashicorpVault SwEdition- Version >= 0.6.0 < 1.21.0
HashicorpVault SwEditionenterprise Version >= 1.18.0 <= 1.18.15
HashicorpVault SwEditionenterprise Version >= 1.19.0 < 1.19.11
HashicorpVault SwEditionenterprise Version >= 1.20.0 < 1.20.5
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.278
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security@hashicorp.com 8.1 2.8 5.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CWE-288 Authentication Bypass Using an Alternate Path or Channel

The product requires authentication, but the product has an alternate path or channel that does not require authentication.