{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T02:33:35.814","vulnerabilities":[{"cve":{"id":"CVE-2025-5999","sourceIdentifier":"security@hashicorp.com","published":"2025-08-01T18:15:56.257","lastModified":"2025-08-13T18:08:26.347","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their own or another user’s token privileges to Vault’s root policy. Fixed in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11 and 1.16.22."},{"lang":"es","value":"Un operador privilegiado de Vault con permisos de escritura en el endpoint de identidad del espacio de nombres raíz podría escalar sus propios privilegios de token o los de otro usuario a la política root de Vault. Corregido en Vault Community Edition 1.20.0 y Vault Enterprise 1.20.0, 1.19.6, 1.18.11 y 1.16.22."}],"metrics":{"cvssMetricV31":[{"source":"security@hashicorp.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@hashicorp.com","type":"Secondary","description":[{"lang":"en","value":"CWE-266"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"0.10.4","versionEndExcluding":"1.16.22","matchCriteriaId":"0DD95155-87A4-4FB2-A257-AE993677DF1A"},{"vulnerable":true,"criteria":"cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*","versionStartIncluding":"0.10.4","versionEndExcluding":"1.20.0","matchCriteriaId":"02142012-C3F7-4AFF-882C-4BAB8A33BCC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.17.0","versionEndExcluding":"1.18.11","matchCriteriaId":"3B9C1900-7E99-42EA-B82C-20385B45330A"},{"vulnerable":true,"criteria":"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.19.0","versionEndExcluding":"1.19.6","matchCriteriaId":"4391BB57-7806-44C8-A879-6CBB8F5A5DCC"}]}]}],"references":[{"url":"https://discuss.hashicorp.com/t/hcsec-2025-13-vault-root-namespace-operator-may-elevate-token-privileges/76032","source":"security@hashicorp.com","tags":["Vendor Advisory"]}]}}]}