GHSA-gmm6-j2g5-r52m

Suggest an improvement
Source
https://github.com/advisories/GHSA-gmm6-j2g5-r52m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-gmm6-j2g5-r52m/GHSA-gmm6-j2g5-r52m.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gmm6-j2g5-r52m
Aliases
  • CVE-2025-13357
Published
2025-11-21T15:31:28Z
Modified
2025-11-21T18:43:59.943039Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Vault’s Terraform Provider incorrectly set default deny_null_bind parameter for LDAP auth method to false by default
Details

Vault’s Terraform Provider incorrectly set the default denynullbind parameter for the LDAP auth method to false by default, potentially resulting in an insecure configuration. If the underlying LDAP server allowed anonymous or unauthenticated binds, this could result in authentication bypass. This vulnerability, CVE-2025-13357, is fixed in Vault Terraform Provider v5.5.0.

Database specific
{
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-1188"
    ],
    "nvd_published_at": "2025-11-21T15:15:51Z",
    "github_reviewed_at": "2025-11-21T18:10:41Z"
}
References

Affected packages

Go / github.com/hashicorp/terraform-provider-vault

Package

Name
github.com/hashicorp/terraform-provider-vault
View open source insights on deps.dev
Purl
pkg:golang/github.com/hashicorp/terraform-provider-vault

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.5.0