CVE-2026-5052 — Server-Side Request Forgery in Vault
Severity
5.3MEDIUMNVD
EPSS
0.0%
top 99.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 17
Description
Vault’s PKI engine’s ACME validation did not reject local targets when issuing http-01 and tls-alpn-01 challenges. This may lead to these requests being sent to local network targets, potentially leading to information disclosure. Fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages11 packages
🔴Vulnerability Details
1GHSA▶
HashiCorp Vault has Server-Side Request Forgery in ACME Challenge Validation via Attacker-Controlled DNS↗2026-04-17
📋Vendor Advisories
1Red Hat▶
Vault: Vault: Information disclosure via Server-Side Request Forgery in ACME challenge validation↗2026-04-17
💬Community
1Bugzilla▶
CVE-2026-5052 Vault: Vault: Information disclosure via Server-Side Request Forgery in ACME challenge validation↗2026-04-17