GHSA-9g4h-h484-3578

Suggest an improvement
Source
https://github.com/advisories/GHSA-9g4h-h484-3578
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-9g4h-h484-3578/GHSA-9g4h-h484-3578.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9g4h-h484-3578
Aliases
  • CVE-2025-11621
Downstream
Published
2025-10-23T21:31:43Z
Modified
2025-10-23T23:43:06.020157Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass
Details

Vault and Vault Enterprise's ("Vault") AWS Auth method may be susceptible to authentication bypass if the role of the configured boundprincipaliam is the same across AWS accounts, or uses a wildcard. This vulnerability is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27.

Database specific
{
    "nvd_published_at": "2025-10-23T19:15:48Z",
    "cwe_ids": [
        "CWE-288"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-10-23T22:21:01Z"
}
References

Affected packages

Go / github.com/hashicorp/vault

Package

Name
github.com/hashicorp/vault
View open source insights on deps.dev
Purl
pkg:golang/github.com/hashicorp/vault

Affected ranges

Type
SEMVER
Events
Introduced
0.6.0
Fixed
1.21.0