CVE-2025-6004
HashiCorp Vault vulnerability analysis and mitigation

Overview

Vault and Vault Enterprise's user lockout feature contained a vulnerability (CVE-2025-6004) that could be bypassed for Userpass and LDAP authentication methods. The vulnerability affects Vault Community Edition versions from 1.13.0 up to 1.20.0 and Vault Enterprise from 1.13.0 up to various versions. This issue was discovered by Yarden Porat of Cyata Security and reported to HashiCorp (HashiCorp Discussion).

Technical details

The vulnerability stems from improper normalization of entity aliases in Vault's user lockout mechanism. Attackers could bypass the lockout mechanism by varying character cases in usernames when an authentication method wasn't configured to be case sensitive. The issue has been assigned a CVSS v3.1 base score of 5.3 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, indicating network accessibility, low attack complexity, and no required privileges or user interaction (AttackerKB).

Impact

The vulnerability allows attackers to circumvent the user lockout security feature, potentially enabling unlimited authentication attempts through brute-force attacks. This particularly affects systems using Userpass and LDAP authentication methods, where the lockout mechanism serves as a critical security control against credential stuffing and password guessing attacks (GBHackers).

Mitigation and workarounds

HashiCorp has released fixes in Vault Community Edition 1.20.1 and Vault Enterprise versions 1.20.1, 1.19.7, 1.18.12, and 1.16.23. The fix ensures proper normalization of entity aliases and preserves case sensitivity for LDAP auth mounts with the casesensitivenames parameter set. Organizations are advised to evaluate their risk and consider implementing rate-limit quotas or upgrading to the patched versions (HashiCorp Discussion).

Additional resources


SourceThis report was generated using AI

Related HashiCorp Vault vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-6203HIGH7.5
  • HashiCorp VaultHashiCorp Vault
  • splunk-otel-collector-fips
NoYesAug 28, 2025
CVE-2025-6037MEDIUM6.8
  • HashiCorp VaultHashiCorp Vault
  • vault
NoYesAug 01, 2025
CVE-2025-6013MEDIUM6.5
  • HashiCorp VaultHashiCorp Vault
  • github.com/hashicorp/vault
NoYesAug 06, 2025
CVE-2025-6016N/AN/A
  • HashiCorp VaultHashiCorp Vault
  • cpe:2.3:a:hashicorp:vault
NoYesAug 07, 2025
CVE-2025-6010MEDIUMN/A
  • HashiCorp VaultHashiCorp Vault
  • cpe:2.3:a:hashicorp:vault
NoYesAug 07, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management