CVE-2025-11621 — Authentication Bypass Using an Alternate Path or Channel in Vault Enterprise
Severity
8.1HIGHNVD
EPSS
0.1%
top 67.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 23
Latest updateOct 30
Description
Vault and Vault Enterprise’s (“Vault”) AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2
Affected Packages3 packages
🔴Vulnerability Details
3OSV▶
HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass in github.com/hashicorp/vault↗2025-10-30
GHSA▶
HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass↗2025-10-23
OSV▶
HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass↗2025-10-23