BIT-vault-2025-11621

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/vault/BIT-vault-2025-11621.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-vault-2025-11621
Aliases
Published
2025-10-28T11:51:04.350Z
Modified
2025-11-05T19:58:58.959295Z
Summary
Vault AWS auth method bypass due to AWS client cache
Details

Vault and Vault Enterprise’s (“Vault”) AWS Auth method may be susceptible to authentication bypass if the role of the configured boundprincipaliam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27

Database specific
{
    "severity": "High",
    "cpes": [
        "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:go:*:*",
        "cpe:2.3:a:hashicorp:vault:*:*:*:*:community:go:*:*"
    ]
}
References

Affected packages

Bitnami / vault

Package

Name
vault
Purl
pkg:bitnami/vault

Severity

  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0.6.0
Fixed
1.21.0