CVE-2025-6203

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.
Configurations

No configuration.

History

28 Aug 2025, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://discuss.hashicorp.com/', 'source': 'security@hashicorp.com'}
  • () https://discuss.hashicorp.com/t/hcsec-2025-24-vault-denial-of-service-though-complex-json-payloads/76393 -

28 Aug 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-28 20:15

Updated : 2025-08-29 16:24


NVD link : CVE-2025-6203

Mitre link : CVE-2025-6203

CVE.ORG link : CVE-2025-6203


JSON object : View

Products Affected

No product.

CWE
CWE-770

Allocation of Resources Without Limits or Throttling