Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59048: CWE-863: Incorrect Authorization in openbao openbao-plugins

0
High
VulnerabilityCVE-2025-59048cvecve-2025-59048cwe-863cwe-694
Published: Thu Oct 23 2025 (10/23/2025, 15:09:06 UTC)
Source: CVE Database V5
Vendor/Project: openbao
Product: openbao-plugins

Description

OpenBao's AWS Plugin generates AWS access credentials based on IAM policies. Prior to version 0.1.1, the AWS Plugin is vulnerable to cross-account IAM role Impersonation in the AWS auth method. The vulnerability allows an IAM role from an untrusted AWS account to authenticate by impersonating a role with the same name in a trusted account, leading to unauthorized access. This impacts all users of the auth-aws plugin who operate in a multi-account AWS environment where IAM role names may not be unique across accounts. This vulnerability has been patched in version 0.1.1 of the auth-aws plugin. A workaround for this issue involves guaranteeing that IAM role names are unique across all AWS accounts that could potentially interact with your OpenBao environment, and to audit for any duplicate IAM roles.

AI-Powered Analysis

AILast updated: 10/23/2025, 15:35:00 UTC

Technical Analysis

The vulnerability identified as CVE-2025-59048 affects the openbao auth-aws plugin versions prior to 0.1.1. OpenBao's AWS plugin generates AWS access credentials based on IAM policies, but it fails to correctly authorize IAM roles in multi-account AWS environments. Specifically, the plugin authenticates IAM roles based solely on their names without verifying the AWS account ID, allowing an attacker with control over an IAM role in an untrusted AWS account to impersonate a role with the same name in a trusted account. This cross-account IAM role impersonation leads to unauthorized access to resources and data that should be restricted. The root cause is an incorrect authorization check (CWE-863) combined with insufficient validation of role uniqueness (CWE-694). The vulnerability is exploitable remotely over the network with low complexity and does not require user interaction. The impact includes full compromise of confidentiality and integrity of AWS resources accessed via the plugin, though availability is not affected. The vulnerability has been addressed in openbao auth-aws plugin version 0.1.1 by implementing proper account context verification during authentication. Until patching, organizations must ensure IAM role names are unique across all AWS accounts interacting with their OpenBao environment and audit for duplicates to prevent impersonation. This vulnerability is particularly critical in multi-account AWS setups common in enterprise cloud deployments.

Potential Impact

For European organizations, this vulnerability poses a significant risk in multi-account AWS environments, which are widely used for segregation of duties, billing, and security boundaries. Unauthorized cross-account role impersonation can lead to data breaches, unauthorized resource manipulation, and potential lateral movement within cloud infrastructure. Confidentiality and integrity of sensitive data and critical cloud services can be compromised, potentially violating GDPR and other data protection regulations. Organizations relying on openbao plugins for AWS authentication may face operational disruptions and reputational damage if exploited. The lack of availability impact reduces the chance of immediate service outages, but stealthy unauthorized access increases the risk of prolonged undetected compromise. The vulnerability also raises compliance concerns for regulated industries such as finance, healthcare, and government sectors prevalent in Europe. Given the high CVSS score and ease of exploitation, the threat demands urgent attention to prevent exploitation in European cloud environments.

Mitigation Recommendations

1. Immediately upgrade the openbao auth-aws plugin to version 0.1.1 or later where the vulnerability is patched. 2. Conduct a thorough audit of all IAM roles across AWS accounts interacting with your OpenBao environment to identify and eliminate duplicate role names. 3. Enforce a strict naming convention policy ensuring IAM role names are unique across all AWS accounts within your organization and trusted partners. 4. Implement additional monitoring and alerting for unusual cross-account authentication attempts or role usage patterns. 5. Review and tighten IAM trust policies to restrict which accounts can assume roles, minimizing the attack surface. 6. Use AWS CloudTrail and other logging tools to detect anomalous access patterns indicative of impersonation attempts. 7. Consider isolating critical workloads into dedicated AWS accounts with minimal cross-account role sharing. 8. Educate cloud administrators about the risks of role name collisions and the importance of multi-account security hygiene. These steps go beyond generic advice by focusing on organizational AWS account hygiene and plugin upgrade urgency.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.172Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa49d81a6be256cbb1964f

Added to database: 10/23/2025, 3:29:28 PM

Last enriched: 10/23/2025, 3:35:00 PM

Last updated: 10/23/2025, 7:33:23 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats