GHSA-6h4p-m86h-hhgh

Suggest an improvement
Source
https://github.com/advisories/GHSA-6h4p-m86h-hhgh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-6h4p-m86h-hhgh/GHSA-6h4p-m86h-hhgh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6h4p-m86h-hhgh
Aliases
Downstream
Published
2025-08-01T18:31:19Z
Modified
2025-08-11T18:14:39.270422Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Hashicorp Vault has Privilege Escalation Vulnerability
Details

A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their own or another user’s token privileges to Vault’s root policy. Fixed in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11 and 1.16.22.

Database specific
{
    "severity": "HIGH",
    "github_reviewed_at": "2025-08-01T21:08:00Z",
    "nvd_published_at": "2025-08-01T18:15:56Z",
    "cwe_ids": [
        "CWE-266"
    ],
    "github_reviewed": true
}
References

Affected packages

Go / github.com/hashicorp/vault

Package

Name
github.com/hashicorp/vault
View open source insights on deps.dev
Purl
pkg:golang/github.com/hashicorp/vault

Affected ranges

Type
SEMVER
Events
Introduced
0.10.4
Fixed
1.20.0