Vault and Vault Enterprise’s (“Vault”) AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27
References
Configurations
Configuration 1 (hide)
|
History
29 Dec 2025, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://discuss.hashicorp.com/t/hcsec-2025-30-vault-aws-auth-method-authentication-bypass-through-mishandling-of-cache-entries/76709 - Vendor Advisory | |
| First Time |
Hashicorp vault
Hashicorp |
|
| CPE | cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:* cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:* |
23 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-23 19:15
Updated : 2025-12-29 17:17
NVD link : CVE-2025-11621
Mitre link : CVE-2025-11621
CVE.ORG link : CVE-2025-11621
JSON object : View
Products Affected
hashicorp
- vault
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
