CVE-2026-39396

OpenBao is an open source identity-based secrets management system. Prior to version 2.5.3, `ExtractPluginFromImage()` in OpenBao's OCI plugin downloader extracts a plugin binary from a container image by streaming decompressed tar data via `io.Copy` with no upper bound on the number of bytes written. An attacker who controls or compromises the OCI registry referenced in the victim's configuration can serve a crafted image containing a decompression bomb that decompresses to an arbitrarily large file. The SHA256 integrity check occurs after the full file is written to disk, meaning the hash mismatch is detected only after the damage (disk exhaustion) has already occurred. This allow the attacker to replace **legit plugin image** with no need to change its signature. Version 2.5.3 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*

History

01 May 2026, 16:36

Type Values Removed Values Added
CPE cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*
References () https://github.com/openbao/openbao/security/advisories/GHSA-r65v-xgwc-g56j - () https://github.com/openbao/openbao/security/advisories/GHSA-r65v-xgwc-g56j - Exploit, Vendor Advisory
First Time Openbao openbao
Openbao

21 Apr 2026, 20:16

Type Values Removed Values Added
References () https://github.com/openbao/openbao/security/advisories/GHSA-r65v-xgwc-g56j - () https://github.com/openbao/openbao/security/advisories/GHSA-r65v-xgwc-g56j -

21 Apr 2026, 01:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-21 01:16

Updated : 2026-05-01 16:36


NVD link : CVE-2026-39396

Mitre link : CVE-2026-39396

CVE.ORG link : CVE-2026-39396


JSON object : View

Products Affected

openbao

  • openbao
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-674

Uncontrolled Recursion

CWE-770

Allocation of Resources Without Limits or Throttling