CVE-2023-0620
HashiCorp Vault vulnerability analysis and mitigation

Overview

HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. The vulnerability, identified as CVE-2023-0620, was discovered and disclosed on March 29, 2023. The issue affects the MSSQL plugin configuration through local settings, where certain parameters are not properly sanitized when passed to the user-provided MSSQL database (HashiCorp Discuss).

Technical details

When configuring MSSQL as a storage backend, several parameters are required to establish a connection to the target database, including username, password, schema, database, and table. The vulnerability exists because Vault considers these values to be trusted and does not sanitize the values for schema, database, and table parameters when establishing a connection between Vault and the database server. The vulnerability has been assigned a CVSS score of 6.7 (MEDIUM) with a vector of CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (NetApp Security).

Impact

Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL commands on the underlying database server through Vault. This could potentially lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS) (NetApp Security).

Mitigation and workarounds

The vulnerability has been fixed in Vault versions 1.13.1, 1.12.5, and 1.11.9. Organizations using the MSSQL storage backend should evaluate the risk and consider upgrading to these patched versions or newer. HashiCorp recommends ensuring that Vault configuration files and storage backends are appropriately secured, as described in Vault's production hardening guidelines. Additionally, they suggest using HashiCorp-supported and highly-available storage backends such as integrated storage or Consul for production use (HashiCorp Discuss).

Additional resources


SourceThis report was generated using AI

Related HashiCorp Vault vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61729HIGH7.5
  • cAdvisorcAdvisor
  • etcd-fips-3.6
NoYesDec 02, 2025
CVE-2025-63811HIGH7.5
  • HashiCorp VaultHashiCorp Vault
  • golang-github-dvsekhvalnov-jose2go
NoYesNov 12, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • argocd-2.14
NoYesDec 03, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • fluent-bit-plugin-loki
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • terraform-provider-databricks-fips
NoYesNov 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management