Description
OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao's Login Multi-Factor Authentication (MFA) system allows enforcing MFA using Time-based One Time Password (TOTP). Due to normalization applied by the underlying TOTP library, codes were accepted which could contain whitespace; this whitespace could bypass internal rate limiting of the MFA method and allow reuse of existing MFA codes. This issue was fixed in version 2.3.2. To work around this, use of rate-limiting quotas can limit an attacker's ability to exploit this: https://openbao.org/api-docs/system/rate-limit-quotas/.
INFO
Published Date :
2025-08-09T02:01:43.985Z
Last Modified :
2025-08-11T14:47:04.206Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-55003 vulnerability.
| Vendors | Products |
|---|---|
| Openbao |
|
| Openbao Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-55003.