CVE-2025-4166 — Information Exposure via Error Message in Hashicorp Vault
Severity
6.5MEDIUMNVD
NVD4.5
EPSS
0.1%
top 65.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 2
Latest updateJun 26
Description
Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages11 packages
🔴Vulnerability Details
6OSV▶
CVE-2025-52893: OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys↗2025-06-25
OSV▶
Hashicorp Vault Community vulnerable to Generation of Error Message Containing Sensitive Information in github.com/hashicorp/vault↗2025-05-06
OSV▶
Hashicorp Vault Community vulnerable to Generation of Error Message Containing Sensitive Information↗2025-05-02