CVE-2025-55001
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-09

Last updated on: 2025-08-12

Assigner: GitHub, Inc.

Description
OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao allowed the assignment of policies and MFA attribution based upon entity aliases, chosen by the underlying auth method. When the username_as_alias=true parameter in the LDAP auth method was in use, the caller-supplied username was used verbatim without normalization, allowing an attacker to bypass alias-specific MFA requirements. This issue was fixed in version 2.3.2. To work around this, remove all usage of the username_as_alias=true parameter and update any entity aliases accordingly.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-09
Last Modified
2025-08-12
Generated
2026-05-07
AI Q&A
2025-08-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openbao openbao to 2.3.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-156 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as whitespace when they are sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in OpenBao versions 2.3.1 and below, where the LDAP authentication method with the parameter username_as_alias=true allowed the use of caller-supplied usernames without normalization. This flaw enabled attackers to bypass multi-factor authentication (MFA) requirements that were assigned based on entity aliases, potentially allowing unauthorized access. The issue was fixed in version 2.3.2 by removing this behavior.


How can this vulnerability impact me? :

An attacker could bypass MFA protections by exploiting the lack of normalization in usernames when username_as_alias=true is used in LDAP authentication. This could lead to unauthorized access to sensitive data managed by OpenBao, including secrets, certificates, and keys, potentially compromising confidentiality and integrity of critical information.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, remove all usage of the username_as_alias=true parameter in the LDAP authentication method and update any entity aliases accordingly. Additionally, upgrade OpenBao to version 2.3.2 or later where this issue is fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart