CVE-2025-54997

OpenBao · OpenBao exists to provide a software solution to Multiple Products

A critical vulnerability has been identified in OpenBao, a software solution for managing sensitive data.

Executive summary

A critical vulnerability has been identified in OpenBao, a software solution for managing sensitive data. This flaw could allow a remote, unauthenticated attacker to access and steal highly sensitive information, such as secrets, certificates, and encryption keys, stored within the system. Successful exploitation would lead to a complete compromise of confidentiality, posing a severe risk to the organization's security posture and data integrity.

Vulnerability

The vulnerability exists within certain API endpoints that fail to properly enforce authentication and authorization controls. A remote, unauthenticated attacker can craft a specialized API request to bypass these security checks. This allows the attacker to read arbitrary secrets stored within the OpenBao vault, effectively gaining unauthorized access to the most sensitive data managed by the instance.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.1. A successful exploit would result in a catastrophic breach of confidentiality. An attacker could exfiltrate all secrets managed by OpenBao, including database credentials, cloud provider API keys, private certificates, and other sensitive credentials. This could lead to widespread system compromise across the organization's infrastructure, significant data breaches, regulatory fines, financial loss, and severe reputational damage.

Remediation

Immediate Action: Immediately update all instances of OpenBao to a version higher than 2.3.1 as recommended by the vendor. Prioritize patching for internet-facing or otherwise exposed deployments. After patching, review access logs for any signs of compromise that may have occurred before the update was applied.

Proactive Monitoring: Organizations should actively monitor OpenBao access logs for anomalous activity. Specifically, look for a high volume of requests from unknown IP addresses, attempts to access multiple secret paths in rapid succession, or any successful API read requests that do not correlate with legitimate, authenticated service activity. Configure alerts for unusual access patterns to the secret-reading endpoints.

Compensating Controls: If immediate patching is not feasible, implement strict network access controls to limit exposure. Use firewalls or network security groups to restrict all access to the OpenBao API and UI to a minimal set of trusted, internal IP addresses. Consider deploying a Web Application Firewall (WAF) with specific rules designed to inspect and block the malicious request patterns associated with this exploit.

Exploitation status

Public Exploit Available: False

Analyst recommendation

This vulnerability represents a severe and immediate threat to the organization. Given the critical CVSS score of 9.1 and the potential for complete compromise of sensitive credentials, we recommend that remediation be treated as the highest priority. All affected OpenBao instances must be patched immediately. Although this CVE is not currently listed on the CISA KEV catalog, its severity makes it a prime candidate for future inclusion, and organizations should act as if exploitation is imminent.