Vault AWS Auth Bypass (CVE-2025-11621) fixed 1.21.0/1.20.5/1.19.11/1.16.27
CVE-2025-11621 Published on October 23, 2025

Vault AWS auth method bypass due to AWS client cache
Vault and Vault Enterprises (Vault) AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27

NVD

Weakness Type

Authentication Bypass Using an Alternate Path or Channel

A product requires authentication, but the product has an alternate path or channel that does not require authentication.


Products Associated with CVE-2025-11621

Want to know whenever a new CVE is published for HashiCorp Vault? stack.watch will email you.

 

Affected Versions

HashiCorp Vault: HashiCorp Vault Enterprise:

Exploit Probability

EPSS
0.17%
Percentile
38.11%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.