Description
A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.
INFO
Published Date :
2025-08-28T19:36:09.870Z
Last Modified :
2025-10-23T18:18:34.361Z
Source :
HashiCorp
AFFECTED PRODUCTS
The following products are affected by CVE-2025-6203 vulnerability.
| Vendors | Products |
|---|---|
| Hashicorp |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-6203.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact