Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11621: CWE-288: Authentication Bypass Using an Alternate Path or Channel in HashiCorp Vault

0
High
VulnerabilityCVE-2025-11621cvecve-2025-11621cwe-288
Published: Thu Oct 23 2025 (10/23/2025, 19:08:54 UTC)
Source: CVE Database V5
Vendor/Project: HashiCorp
Product: Vault

Description

Vault and Vault Enterprise’s (“Vault”) AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:37:51 UTC

Technical Analysis

CVE-2025-11621 is a vulnerability classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel) affecting HashiCorp Vault's AWS Auth method. Vault allows authentication via AWS IAM roles, where the bound_principal_iam parameter restricts which IAM roles can authenticate. If this parameter is configured with the same IAM role across multiple AWS accounts or uses a wildcard, an attacker can exploit this to bypass authentication controls. This bypass occurs because Vault cannot distinguish between roles from different accounts or overly permissive role specifications, allowing an attacker with low privileges in one AWS account to impersonate a trusted role in Vault. The vulnerability affects Vault versions starting from 0.6.0 up to versions prior to the patched releases: Community Edition 1.21.0 and Enterprise Editions 1.21.0, 1.20.5, 1.19.11, and 1.16.27. The CVSS v3.1 base score is 8.1, indicating high severity, with attack vector as network, low attack complexity, requiring privileges but no user interaction, and resulting in high confidentiality and integrity impact without affecting availability. No public exploits are known yet, but the vulnerability poses a significant risk due to the sensitive nature of Vault's secret management. The flaw highlights the importance of precise IAM role configurations and the risks of wildcard or duplicated roles across AWS accounts. HashiCorp has addressed the issue in the specified patched versions.

Potential Impact

The impact of CVE-2025-11621 is substantial for organizations relying on HashiCorp Vault for secret management, especially those using the AWS Auth method. Successful exploitation allows attackers to bypass authentication, potentially gaining unauthorized access to sensitive secrets such as API keys, credentials, certificates, and other confidential data stored in Vault. This can lead to lateral movement within the network, privilege escalation, data exfiltration, and compromise of critical infrastructure. Since Vault is widely used in cloud-native environments and DevOps pipelines, the breach of Vault secrets can disrupt automated deployments and security controls. The vulnerability's ease of exploitation (low complexity, network accessible) combined with high confidentiality and integrity impact elevates the risk profile. Organizations with multi-account AWS environments that reuse IAM roles or employ wildcard roles are particularly vulnerable. The absence of known exploits in the wild provides a window for remediation, but the potential damage from exploitation is severe.

Mitigation Recommendations

To mitigate CVE-2025-11621, organizations should immediately upgrade HashiCorp Vault to the patched versions: Community Edition 1.21.0 or Enterprise Editions 1.21.0, 1.20.5, 1.19.11, or 1.16.27. Additionally, review and audit AWS IAM role configurations used in Vault's AWS Auth method. Avoid using identical IAM roles across multiple AWS accounts and eliminate wildcard role specifications in the bound_principal_iam parameter. Implement strict IAM role scoping to ensure roles are unique per account and follow the principle of least privilege. Employ monitoring and alerting on Vault authentication logs to detect anomalous access patterns. Consider using additional authentication methods or multi-factor authentication where possible. Regularly test Vault configurations in staging environments to validate that authentication restrictions are effective. Finally, maintain an incident response plan to quickly address any suspected compromise of Vault secrets.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
HashiCorp
Date Reserved
2025-10-10T19:48:57.601Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa7ed3a3a2e7083d87191c

Added to database: 10/23/2025, 7:15:31 PM

Last enriched: 2/27/2026, 4:37:51 AM

Last updated: 3/25/2026, 2:55:22 AM

Views: 307

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses