CVE-2026-4525: If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used...
HIGH
CVSS 7.5
Exploit Available
Published: April 17, 2026 | Last Modified: April 17, 2026
Description
If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend. Fixed in 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
Ghostwire Analysis — What This Means Practically
- High CVSS score indicates significant risk — exploitation could lead to substantial data exposure or system compromise.
- Exploit code is reported to be available, increasing the likelihood of active exploitation.
This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.
Security Coverage (1 articles)
References