CVE-2025-6004Improper Restriction of Excessive Authentication Attempts in Vault Enterprise

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 83.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 1
Latest updateAug 11

Description

Vault and Vault Enterprise’s (“Vault”) user lockout feature could be bypassed for Userpass and LDAP authentication methods. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages6 packages

CVEListV5hashicorp/vault_enterprise1.13.01.20.1
NVDhashicorp/vault1.13.01.16.23+4
Gogithub.com/hashicorp_vault1.13.01.20.1
Gogithub.com/openbao_openbao0.1.02.3.2+1

🔴Vulnerability Details

5
OSV
Hashicorp Vault has Lockout Feature Authentication Bypass in github.com/hashicorp/vault2025-08-11
OSV
OpenBao Userpass and LDAP User Lockout Bypass2025-08-08
GHSA
OpenBao Userpass and LDAP User Lockout Bypass2025-08-08
GHSA
Hashicorp Vault has Lockout Feature Authentication Bypass2025-08-01
OSV
Hashicorp Vault has Lockout Feature Authentication Bypass2025-08-01

📋Vendor Advisories

2
Red Hat
github.com/hashicorp/vault: Vault Userpass/LDAP Lockout Bypass Vulnerability2025-08-01
Microsoft
Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname2024-01-09