CVE-2026-3605Authentication Bypass Using an Alternate Path or Channel in Vault

Severity
8.1HIGHNVD
EPSS
0.0%
top 98.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 17

Description

An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delete secrets across namespaces, nor read any secret data. Fxed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 2.8 | Impact: 5.2

Affected Packages11 packages

CVEListV5hashicorp/vault_enterprise0.10.02.0.0
CVEListV5hashicorp/vault0.10.02.0.0
Gogithub.com/hashicorp_vault0.10.01.21.4

🔴Vulnerability Details

1
GHSA
HashiCorp Vault has a KVv2 Metadata and Secret Deletion Policy Bypass that leads to Denial-of-Service2026-04-17

📋Vendor Advisories

1
Red Hat
Vault: Vault: Denial of Service due to unauthorized secret deletion via policy bypass2026-04-17

💬Community

1
Bugzilla
CVE-2026-3605 Vault: Vault: Denial of Service due to unauthorized secret deletion via policy bypass2026-04-17