CVE-2025-13432: CWE-863: Incorrect Authorization in HashiCorp Terraform Enterprise
Terraform state versions can be created by a user with specific but insufficient permissions in a Terraform Enterprise workspace. This may allow for the alteration of infrastructure if a subsequent plan operation is approved by a user with approval permission or auto-applied. This vulnerability, CVE-2025-13432, is fixed in Terraform Enterprise version 1.1.1 and 1.0.3.
AI Analysis
Technical Summary
CVE-2025-13432 is an authorization bypass vulnerability classified under CWE-863, found in HashiCorp Terraform Enterprise version 1.0.0. Terraform Enterprise manages infrastructure as code and maintains state versions to track infrastructure changes. The vulnerability arises because users with certain limited permissions can create new Terraform state versions without having full authorization. This flaw allows these users to prepare potentially malicious or unauthorized infrastructure changes. If a user with approval permissions subsequently approves the plan or if the plan is auto-applied, these unauthorized changes can be implemented, leading to integrity violations in the managed infrastructure. The vulnerability does not expose confidential data nor does it cause denial of service but can lead to unauthorized infrastructure modifications, which may disrupt operations or introduce security risks. The CVSS v3.1 base score is 4.3 (medium severity), reflecting network attack vector, low complexity, required privileges, no user interaction, and impact limited to integrity. The issue was addressed in Terraform Enterprise versions 1.1.1 and 1.0.3. No known exploits are reported in the wild as of the publication date. The vulnerability highlights the importance of strict authorization checks in infrastructure automation platforms to prevent privilege escalation and unauthorized changes.
Potential Impact
For European organizations, especially those heavily reliant on Terraform Enterprise for infrastructure automation and cloud management, this vulnerability poses a risk of unauthorized infrastructure changes. Such changes can lead to misconfigurations, service disruptions, or the introduction of insecure infrastructure components, potentially impacting operational continuity and compliance with regulatory requirements such as GDPR. While the vulnerability does not directly expose sensitive data or cause service outages, the integrity compromise can cascade into broader security incidents or compliance violations. Organizations in sectors with critical infrastructure or stringent regulatory oversight (e.g., finance, healthcare, energy) may face heightened risks. Additionally, unauthorized infrastructure changes could be leveraged as a foothold for further attacks or data exfiltration if combined with other vulnerabilities or insider threats.
Mitigation Recommendations
1. Upgrade Terraform Enterprise to version 1.1.1 or 1.0.3 immediately to apply the official patch addressing this vulnerability. 2. Review and tighten role-based access controls (RBAC) to ensure users have only the minimum necessary permissions, particularly restricting who can create state versions and approve plans. 3. Implement monitoring and alerting on state version creation and plan approval activities to detect anomalous or unauthorized actions promptly. 4. Enforce multi-person approval workflows for critical infrastructure changes to reduce the risk of unauthorized modifications being applied. 5. Conduct regular audits of Terraform workspace permissions and state version histories to identify and remediate potential abuse. 6. Educate DevOps and security teams about the risks of improper authorization in infrastructure automation tools and promote secure operational practices. 7. Consider network segmentation and access controls to limit exposure of Terraform Enterprise interfaces to trusted personnel only.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland
CVE-2025-13432: CWE-863: Incorrect Authorization in HashiCorp Terraform Enterprise
Description
Terraform state versions can be created by a user with specific but insufficient permissions in a Terraform Enterprise workspace. This may allow for the alteration of infrastructure if a subsequent plan operation is approved by a user with approval permission or auto-applied. This vulnerability, CVE-2025-13432, is fixed in Terraform Enterprise version 1.1.1 and 1.0.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-13432 is an authorization bypass vulnerability classified under CWE-863, found in HashiCorp Terraform Enterprise version 1.0.0. Terraform Enterprise manages infrastructure as code and maintains state versions to track infrastructure changes. The vulnerability arises because users with certain limited permissions can create new Terraform state versions without having full authorization. This flaw allows these users to prepare potentially malicious or unauthorized infrastructure changes. If a user with approval permissions subsequently approves the plan or if the plan is auto-applied, these unauthorized changes can be implemented, leading to integrity violations in the managed infrastructure. The vulnerability does not expose confidential data nor does it cause denial of service but can lead to unauthorized infrastructure modifications, which may disrupt operations or introduce security risks. The CVSS v3.1 base score is 4.3 (medium severity), reflecting network attack vector, low complexity, required privileges, no user interaction, and impact limited to integrity. The issue was addressed in Terraform Enterprise versions 1.1.1 and 1.0.3. No known exploits are reported in the wild as of the publication date. The vulnerability highlights the importance of strict authorization checks in infrastructure automation platforms to prevent privilege escalation and unauthorized changes.
Potential Impact
For European organizations, especially those heavily reliant on Terraform Enterprise for infrastructure automation and cloud management, this vulnerability poses a risk of unauthorized infrastructure changes. Such changes can lead to misconfigurations, service disruptions, or the introduction of insecure infrastructure components, potentially impacting operational continuity and compliance with regulatory requirements such as GDPR. While the vulnerability does not directly expose sensitive data or cause service outages, the integrity compromise can cascade into broader security incidents or compliance violations. Organizations in sectors with critical infrastructure or stringent regulatory oversight (e.g., finance, healthcare, energy) may face heightened risks. Additionally, unauthorized infrastructure changes could be leveraged as a foothold for further attacks or data exfiltration if combined with other vulnerabilities or insider threats.
Mitigation Recommendations
1. Upgrade Terraform Enterprise to version 1.1.1 or 1.0.3 immediately to apply the official patch addressing this vulnerability. 2. Review and tighten role-based access controls (RBAC) to ensure users have only the minimum necessary permissions, particularly restricting who can create state versions and approve plans. 3. Implement monitoring and alerting on state version creation and plan approval activities to detect anomalous or unauthorized actions promptly. 4. Enforce multi-person approval workflows for critical infrastructure changes to reduce the risk of unauthorized modifications being applied. 5. Conduct regular audits of Terraform workspace permissions and state version histories to identify and remediate potential abuse. 6. Educate DevOps and security teams about the risks of improper authorization in infrastructure automation tools and promote secure operational practices. 7. Consider network segmentation and access controls to limit exposure of Terraform Enterprise interfaces to trusted personnel only.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- HashiCorp
- Date Reserved
- 2025-11-19T16:38:34.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6920778b69daa88a9a1ad75a
Added to database: 11/21/2025, 2:30:35 PM
Last enriched: 11/21/2025, 2:46:05 PM
Last updated: 1/7/2026, 8:46:18 AM
Views: 96
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.