{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-54998","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-08-04T17:34:24.420Z","datePublished":"2025-08-09T02:00:27.597Z","dateUpdated":"2025-08-11T14:38:33.591Z"},"containers":{"cna":{"title":"OpenBao Userpass and LDAP User Lockout Bypass","problemTypes":[{"descriptions":[{"cweId":"CWE-307","lang":"en","description":"CWE-307: Improper Restriction of Excessive Authentication Attempts","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/openbao/openbao/security/advisories/GHSA-j3xv-7fxp-gfhx","tags":["x_refsource_CONFIRM"],"url":"https://github.com/openbao/openbao/security/advisories/GHSA-j3xv-7fxp-gfhx"},{"name":"https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc","tags":["x_refsource_MISC"],"url":"https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc"},{"name":"https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035","tags":["x_refsource_MISC"],"url":"https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035"}],"affected":[{"vendor":"openbao","product":"openbao","versions":[{"version":">= 0.1.0, < 2.3.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-08-09T02:00:27.597Z"},"descriptions":[{"lang":"en","value":"OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, attackers could bypass the automatic user lockout mechanisms in the OpenBao Userpass or LDAP auth systems. This was caused by different aliasing between pre-flight and full login request user entity alias attributions. This is fixed in version 2.3.2. To work around this issue, existing users may apply rate-limiting quotas on the authentication endpoints:, see https://openbao.org/api-docs/system/rate-limit-quotas/."}],"source":{"advisory":"GHSA-j3xv-7fxp-gfhx","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-11T14:38:13.223350Z","id":"CVE-2025-54998","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-11T14:38:33.591Z"}}]}}