HomeHashicorpCVE-2025-6203

CVE-2025-6203

HIGH
7.5CVSS
Published: 2025-08-28
Updated: 2025-12-18
AI Analysis

Description

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-770

Metadata

Primary Vendor
HASHICORP
Published
8/28/2025
Last Modified
12/18/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

hashicorp : vaulthashicorp : vaulthashicorp : vaulthashicorp : vaulthashicorp : vault

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-6203 | HIGH Severity | CVEDatabase.com | CVEDatabase.com