Introducing Wiz for Exposure Management: Unify, prioritize, and remediate exposures everywhere.

CVE-2025-5999
HashiCorp Vault vulnerability analysis and mitigation

Overview

CVE-2025-5999 is a privilege escalation vulnerability discovered in HashiCorp Vault that affects versions from 0.10.4 up to 1.19.5 in both Community and Enterprise editions. The vulnerability was discovered by Yarden Porat of Cyata Security and publicly disclosed on August 1, 2025. The issue allows privileged Vault operators with write permissions to the root namespace's identity endpoint to escalate their own or another user's token privileges to Vault's root policy (HashiCorp Discussion).

Technical details

The vulnerability stems from incomplete input validation and normalization of policy names in Vault's identity secrets engine. The identity secrets engine is designed to map Vault clients (entities) to multiple authentication methods for managing authentication and authorization. The flaw specifically affects entities in the root namespace due to the way policy names are handled, while entities in other namespaces, including administrative namespaces, remain unaffected. This vulnerability does not impact HCP Vault Dedicated due to its use of administrative namespaces (HashiCorp Discussion).

Impact

The vulnerability allows privileged operators to escalate token privileges to Vault's root policy, effectively gaining the highest level of access within the system. When exploited, the elevated privileges persist for the remainder of the token's validity period. The impact is particularly significant as it affects the root namespace, though it does not extend to entities in other namespaces (HashiCorp Discussion).

Mitigation and workarounds

HashiCorp has released fixes in multiple versions: Vault Community Edition 1.20.0 and Vault Enterprise versions 1.20.0, 1.19.6, 1.18.11, and 1.16.22. Organizations are advised to upgrade to these patched versions. As an alternative mitigation strategy, Sentinel EGP policies can be implemented. Organizations can also monitor their Vault audit logs for unauthorized privilege escalations (HashiCorp Discussion).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management