HomeOpenbaoCVE-2025-59048

CVE-2025-59048

HIGH
8.1CVSS
Published: 2025-10-23
Updated: 2025-12-05
AI Analysis

Description

OpenBao's AWS Plugin generates AWS access credentials based on IAM policies. Prior to version 0.1.1, the AWS Plugin is vulnerable to cross-account IAM role Impersonation in the AWS auth method. The vulnerability allows an IAM role from an untrusted AWS account to authenticate by impersonating a role with the same name in a trusted account, leading to unauthorized access. This impacts all users of the auth-aws plugin who operate in a multi-account AWS environment where IAM role names may not be unique across accounts. This vulnerability has been patched in version 0.1.1 of the auth-aws plugin. A workaround for this issue involves guaranteeing that IAM role names are unique across all AWS accounts that could potentially interact with your OpenBao environment, and to audit for any duplicate IAM roles.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-694CWE-863

Metadata

Primary Vendor
OPENBAO
Published
10/23/2025
Last Modified
12/5/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

openbao : aws_plugin

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-59048 | HIGH Severity | CVEDatabase.com | CVEDatabase.com