📦 Vault
by Hashicorp
🔍 What is Vault?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A privileged Vault operator with write permission to the sys/audit endpoint can execute arbitrary code on the underlying host when Vault is configured with a plugin directory. This affects HashiCorp V...
HashiCorp Vault Enterprise clusters using Integrated Storage expose an unauthenticated API endpoint that allows attackers to override a node's voter status in HA clusters. This could lead to cluster i...
This vulnerability allows remote attackers to gain root access to systems running affected Vault Docker images by using a blank password. It affects anyone using official Vault Docker images before ve...
Vault and Vault Enterprise are vulnerable to unauthenticated denial of service attacks when processing JSON payloads due to a regression in rate limiting. This allows attackers to send specially craft...
This vulnerability allows authentication bypass in HashiCorp Vault's AWS Auth method when the bound_principal_iam role is identical across AWS accounts or uses wildcards. Attackers could gain unauthor...
CVE-2025-6203 is a denial-of-service vulnerability in HashiCorp Vault where specially crafted JSON payloads can cause excessive memory and CPU consumption, potentially making the Vault server unrespon...
A privileged Vault operator with write permissions to the root namespace's identity endpoint can escalate token privileges to Vault's root policy, granting full administrative control. This affects Ha...
This vulnerability allows attackers to cause denial-of-service through memory exhaustion by sending excessive requests to Vault's Raft cluster join API endpoint. It affects Vault Community and Enterpr...
This vulnerability allows a Vault operator with write permissions to the root namespace's identity endpoint to escalate their own or another user's privileges to Vault's root policy. This affects Hash...
HashiCorp Vault versions 1.12.0 and newer are vulnerable to denial of service through memory exhaustion when processing large HTTP requests. Attackers can send specially crafted requests that cause Va...
This vulnerability in HashiCorp Vault's Google Cloud secrets engine removes existing IAM Conditions when creating or updating rolesets, potentially granting unintended permissions. It affects Vault an...
HashiCorp Vault and Vault Enterprise had a vulnerability where tokens or dynamic secret leases within 1 second of expiration could be renewed and incorrectly treated as non-expiring. This allowed exte...
HashiCorp Vault's Cassandra integrations failed to validate TLS certificates when connecting to Cassandra clusters, allowing man-in-the-middle attacks. This affects Vault deployments using Cassandra a...
HashiCorp Vault Enterprise versions 1.6.0 and 1.6.1 allow unauthenticated execution of the 'remove-peer' raft operator command on DR (Disaster Recovery) secondaries. This vulnerability enables attacke...
This vulnerability allows attackers to bypass multi-factor authentication (MFA) rate limiting and reuse TOTP tokens in HashiCorp Vault, potentially enabling unauthorized access. It affects Vault Commu...
The Vault TLS certificate authentication method fails to properly validate client certificates when configured with non-CA certificates as trusted certificates. This allows attackers to craft maliciou...
The Vault TOTP secrets engine code validation endpoint allows time-based one-time password codes to be reused within their validity period. This affects HashiCorp Vault Community Edition and Vault Ent...
CVE-2025-4166 allows sensitive information exposure in Vault server and audit logs when users submit malformed payloads during secret creation or update operations via the KV v2 plugin REST API. This ...
This vulnerability in HashiCorp Vault's PKI mount allows unauthorized users to delete or modify PKI issuer metadata, potentially causing denial of service for the PKI mount. It affects Vault deploymen...