{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T20:27:10.031","vulnerabilities":[{"cve":{"id":"CVE-2025-54998","sourceIdentifier":"security-advisories@github.com","published":"2025-08-09T03:15:46.463","lastModified":"2025-11-13T17:51:59.120","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, attackers could bypass the automatic user lockout mechanisms in the OpenBao Userpass or LDAP auth systems. This was caused by different aliasing between pre-flight and full login request user entity alias attributions. This is fixed in version 2.3.2. To work around this issue, existing users may apply rate-limiting quotas on the authentication endpoints:, see https://openbao.org/api-docs/system/rate-limit-quotas/."},{"lang":"es","value":"OpenBao existe para proporcionar una solución de software que permite gestionar, almacenar y distribuir datos confidenciales, como secretos, certificados y claves. En las versiones 0.1.0 a 2.3.1, los atacantes podían eludir los mecanismos de bloqueo automático de usuarios en los sistemas de autenticación OpenBao Userpass o LDAP. Esto se debía a una asignación de alias diferente entre las atribuciones de alias de entidad de usuario de las solicitudes de inicio de sesión previas al vuelo y de inicio de sesión completo. Esto se solucionó en la versión 2.3.2. Para solucionar este problema, los usuarios pueden aplicar cuotas de limitación de velocidad en los endpoints de autenticación (consulte https://openbao.org/api-docs/system/rate-limit-quotas/)."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-307"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*","versionEndExcluding":"2.3.2","matchCriteriaId":"5572B591-02AC-4B8F-8956-FC9A606D7F32"}]}]}],"references":[{"url":"https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035","source":"security-advisories@github.com","tags":["Not Applicable"]},{"url":"https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/openbao/openbao/security/advisories/GHSA-j3xv-7fxp-gfhx","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}