Description
OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao's website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.
INFO
Published Date :
2025-06-25T16:59:02.058Z
Last Modified :
2025-06-25T20:24:28.109Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-52894 vulnerability.
| Vendors | Products |
|---|---|
| Openbao |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-52894.