
We found results for “”
CVE-2025-54998
Good to know:


Date: August 8, 2025
OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, attackers could bypass the automatic user lockout mechanisms in the OpenBao Userpass or LDAP auth systems. This was caused by different aliasing between pre-flight and full login request user entity alias attributions. This is fixed in version 2.3.2. To work around this issue, existing users may apply rate-limiting quotas on the authentication endpoints:, see https://openbao.org/api-docs/system/rate-limit-quotas/.
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Improper Restriction of Excessive Authentication Attempts
CWE-307Top Fix

Upgrade Version
Upgrade to version github.com/openbao/openbao - v2.3.2;github.com/openbao/openbao - v0.0.0-20250807212521-c52795c1ef74
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | CHANGED |
Confidentiality (C): | NONE |
Integrity (I): | HIGH |
Availability (A): | HIGH |